2 * Server-side XDR for NFSv4
4 * Copyright (c) 2002 The Regents of the University of Michigan.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 #include <linux/file.h>
37 #include <linux/slab.h>
38 #include <linux/namei.h>
39 #include <linux/statfs.h>
40 #include <linux/utsname.h>
41 #include <linux/pagemap.h>
42 #include <linux/sunrpc/svcauth_gss.h>
43 #include <linux/sunrpc/addr.h>
44 #include <linux/xattr.h>
45 #include <linux/vmalloc.h>
47 #include <uapi/linux/xattr.h>
57 #include "filecache.h"
61 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
62 #include <linux/security.h>
66 #define NFSDDBG_FACILITY NFSDDBG_XDR
68 const u32 nfsd_suppattrs[3][3] = {
69 {NFSD4_SUPPORTED_ATTRS_WORD0,
70 NFSD4_SUPPORTED_ATTRS_WORD1,
71 NFSD4_SUPPORTED_ATTRS_WORD2},
73 {NFSD4_1_SUPPORTED_ATTRS_WORD0,
74 NFSD4_1_SUPPORTED_ATTRS_WORD1,
75 NFSD4_1_SUPPORTED_ATTRS_WORD2},
77 {NFSD4_1_SUPPORTED_ATTRS_WORD0,
78 NFSD4_1_SUPPORTED_ATTRS_WORD1,
79 NFSD4_2_SUPPORTED_ATTRS_WORD2},
83 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
84 * directory in order to indicate to the client that a filesystem boundary is present
85 * We use a fixed fsid for a referral
87 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
88 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
91 check_filename(char *str, int len)
97 if (len > NFS4_MAXNAMLEN)
98 return nfserr_nametoolong;
99 if (isdotent(str, len))
100 return nfserr_badname;
101 for (i = 0; i < len; i++)
103 return nfserr_badname;
107 static int zero_clientid(clientid_t *clid)
109 return (clid->cl_boot == 0) && (clid->cl_id == 0);
113 * svcxdr_tmpalloc - allocate memory to be freed after compound processing
114 * @argp: NFSv4 compound argument structure
115 * @len: length of buffer to allocate
117 * Allocates a buffer of size @len to be freed when processing the compound
118 * operation described in @argp finishes.
121 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len)
123 struct svcxdr_tmpbuf *tb;
125 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL);
128 tb->next = argp->to_free;
134 * For xdr strings that need to be passed to other kernel api's
135 * as null-terminated strings.
137 * Note null-terminating in place usually isn't safe since the
138 * buffer might end on a page boundary.
141 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len)
143 char *p = svcxdr_tmpalloc(argp, len + 1);
153 svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, u32 len)
158 * The location of the decoded data item is stable,
159 * so @p is OK to use. This is the common case.
161 if (p != argp->xdr->scratch.iov_base)
164 tmp = svcxdr_tmpalloc(argp, len);
172 * NFSv4 basic data type decoders
176 * This helper handles variable-length opaques which belong to protocol
177 * elements that this implementation does not support.
180 nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen)
184 if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
185 return nfserr_bad_xdr;
186 if (maxlen && len > maxlen)
187 return nfserr_bad_xdr;
188 if (!xdr_inline_decode(argp->xdr, len))
189 return nfserr_bad_xdr;
195 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
200 if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
201 return nfserr_bad_xdr;
202 if (len == 0 || len > NFS4_OPAQUE_LIMIT)
203 return nfserr_bad_xdr;
204 p = xdr_inline_decode(argp->xdr, len);
206 return nfserr_bad_xdr;
207 o->data = svcxdr_savemem(argp, p, len);
209 return nfserr_jukebox;
216 nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp)
220 if (xdr_stream_decode_u32(argp->xdr, lenp) < 0)
221 return nfserr_bad_xdr;
222 p = xdr_inline_decode(argp->xdr, *lenp);
224 return nfserr_bad_xdr;
225 status = check_filename((char *)p, *lenp);
228 *namp = svcxdr_savemem(argp, p, *lenp);
230 return nfserr_jukebox;
236 nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv)
240 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3);
242 return nfserr_bad_xdr;
243 p = xdr_decode_hyper(p, &tv->tv_sec);
244 tv->tv_nsec = be32_to_cpup(p++);
245 if (tv->tv_nsec >= (u32)1000000000)
251 nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf)
255 p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE);
257 return nfserr_bad_xdr;
258 memcpy(verf->data, p, sizeof(verf->data));
263 * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4
264 * @argp: NFSv4 compound argument structure
265 * @bmval: pointer to an array of u32's to decode into
266 * @bmlen: size of the @bmval array
268 * The server needs to return nfs_ok rather than nfserr_bad_xdr when
269 * encountering bitmaps containing bits it does not recognize. This
270 * includes bits in bitmap words past WORDn, where WORDn is the last
271 * bitmap WORD the implementation currently supports. Thus we are
272 * careful here to simply ignore bits in bitmap words that this
273 * implementation has yet to support explicitly.
276 * %nfs_ok: @bmval populated successfully
277 * %nfserr_bad_xdr: the encoded bitmap was invalid
280 nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen)
284 status = xdr_stream_decode_uint32_array(argp->xdr, bmval, bmlen);
285 return status == -EBADMSG ? nfserr_bad_xdr : nfs_ok;
289 nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace)
294 if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0)
295 return nfserr_bad_xdr;
296 if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0)
297 return nfserr_bad_xdr;
298 if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0)
299 return nfserr_bad_xdr;
301 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
302 return nfserr_bad_xdr;
303 p = xdr_inline_decode(argp->xdr, length);
305 return nfserr_bad_xdr;
306 ace->whotype = nfs4_acl_get_whotype((char *)p, length);
307 if (ace->whotype != NFS4_ACL_WHO_NAMED)
309 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
310 status = nfsd_map_name_to_gid(argp->rqstp,
311 (char *)p, length, &ace->who_gid);
313 status = nfsd_map_name_to_uid(argp->rqstp,
314 (char *)p, length, &ace->who_uid);
319 /* A counted array of nfsace4's */
320 static noinline __be32
321 nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl)
323 struct nfs4_ace *ace;
327 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
328 return nfserr_bad_xdr;
330 if (count > xdr_stream_remaining(argp->xdr) / 20)
332 * Even with 4-byte names there wouldn't be
333 * space for that many aces; something fishy is
338 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count));
340 return nfserr_jukebox;
342 (*acl)->naces = count;
343 for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) {
344 status = nfsd4_decode_nfsace4(argp, ace);
352 static noinline __be32
353 nfsd4_decode_security_label(struct nfsd4_compoundargs *argp,
354 struct xdr_netobj *label)
359 if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0)
360 return nfserr_bad_xdr;
361 if (xdr_stream_decode_u32(argp->xdr, &pi) < 0)
362 return nfserr_bad_xdr;
364 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
365 return nfserr_bad_xdr;
366 if (length > NFS4_MAXLABELLEN)
367 return nfserr_badlabel;
368 p = xdr_inline_decode(argp->xdr, length);
370 return nfserr_bad_xdr;
372 label->data = svcxdr_dupstr(argp, p, length);
374 return nfserr_jukebox;
380 nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen,
381 struct iattr *iattr, struct nfs4_acl **acl,
382 struct xdr_netobj *label, int *umask)
384 unsigned int starting_pos;
389 status = nfsd4_decode_bitmap4(argp, bmval, bmlen);
391 return nfserr_bad_xdr;
393 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
394 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
395 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) {
396 if (nfsd_attrs_supported(argp->minorversion, bmval))
398 return nfserr_attrnotsupp;
401 if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0)
402 return nfserr_bad_xdr;
403 starting_pos = xdr_stream_pos(argp->xdr);
405 if (bmval[0] & FATTR4_WORD0_SIZE) {
408 if (xdr_stream_decode_u64(argp->xdr, &size) < 0)
409 return nfserr_bad_xdr;
410 iattr->ia_size = size;
411 iattr->ia_valid |= ATTR_SIZE;
413 if (bmval[0] & FATTR4_WORD0_ACL) {
414 status = nfsd4_decode_acl(argp, acl);
419 if (bmval[1] & FATTR4_WORD1_MODE) {
422 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
423 return nfserr_bad_xdr;
424 iattr->ia_mode = mode;
425 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
426 iattr->ia_valid |= ATTR_MODE;
428 if (bmval[1] & FATTR4_WORD1_OWNER) {
431 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
432 return nfserr_bad_xdr;
433 p = xdr_inline_decode(argp->xdr, length);
435 return nfserr_bad_xdr;
436 status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length,
440 iattr->ia_valid |= ATTR_UID;
442 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
445 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
446 return nfserr_bad_xdr;
447 p = xdr_inline_decode(argp->xdr, length);
449 return nfserr_bad_xdr;
450 status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length,
454 iattr->ia_valid |= ATTR_GID;
456 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
459 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
460 return nfserr_bad_xdr;
462 case NFS4_SET_TO_CLIENT_TIME:
463 status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime);
466 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
468 case NFS4_SET_TO_SERVER_TIME:
469 iattr->ia_valid |= ATTR_ATIME;
472 return nfserr_bad_xdr;
475 if (bmval[1] & FATTR4_WORD1_TIME_CREATE) {
476 struct timespec64 ts;
478 /* No Linux filesystem supports setting this attribute. */
479 bmval[1] &= ~FATTR4_WORD1_TIME_CREATE;
480 status = nfsd4_decode_nfstime4(argp, &ts);
484 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
487 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
488 return nfserr_bad_xdr;
490 case NFS4_SET_TO_CLIENT_TIME:
491 status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime);
494 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
496 case NFS4_SET_TO_SERVER_TIME:
497 iattr->ia_valid |= ATTR_MTIME;
500 return nfserr_bad_xdr;
504 if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) &&
505 bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
506 status = nfsd4_decode_security_label(argp, label);
510 if (bmval[2] & FATTR4_WORD2_MODE_UMASK) {
514 return nfserr_bad_xdr;
515 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
516 return nfserr_bad_xdr;
517 iattr->ia_mode = mode & (S_IFMT | S_IALLUGO);
518 if (xdr_stream_decode_u32(argp->xdr, &mask) < 0)
519 return nfserr_bad_xdr;
520 *umask = mask & S_IRWXUGO;
521 iattr->ia_valid |= ATTR_MODE;
524 /* request sanity: did attrlist4 contain the expected number of words? */
525 if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos)
526 return nfserr_bad_xdr;
532 nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid)
536 p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE);
538 return nfserr_bad_xdr;
539 sid->si_generation = be32_to_cpup(p++);
540 memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque));
545 nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid)
549 p = xdr_inline_decode(argp->xdr, sizeof(__be64));
551 return nfserr_bad_xdr;
552 memcpy(clientid, p, sizeof(*clientid));
557 nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp,
558 clientid_t *clientid, struct xdr_netobj *owner)
562 status = nfsd4_decode_clientid4(argp, clientid);
565 return nfsd4_decode_opaque(argp, owner);
568 #ifdef CONFIG_NFSD_PNFS
570 nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp,
571 struct nfsd4_deviceid *devid)
575 p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE);
577 return nfserr_bad_xdr;
578 memcpy(devid, p, sizeof(*devid));
583 nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp,
584 struct nfsd4_layoutcommit *lcp)
586 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0)
587 return nfserr_bad_xdr;
588 if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES)
589 return nfserr_bad_xdr;
590 if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX)
591 return nfserr_bad_xdr;
593 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0)
594 return nfserr_bad_xdr;
595 if (lcp->lc_up_len > 0) {
596 lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len);
597 if (!lcp->lc_up_layout)
598 return nfserr_bad_xdr;
605 nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp,
606 struct nfsd4_layoutreturn *lrp)
610 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0)
611 return nfserr_bad_xdr;
612 switch (lrp->lr_return_type) {
614 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0)
615 return nfserr_bad_xdr;
616 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0)
617 return nfserr_bad_xdr;
618 status = nfsd4_decode_stateid4(argp, &lrp->lr_sid);
621 if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0)
622 return nfserr_bad_xdr;
623 if (lrp->lrf_body_len > 0) {
624 lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len);
626 return nfserr_bad_xdr;
631 lrp->lr_seg.offset = 0;
632 lrp->lr_seg.length = NFS4_MAX_UINT64;
635 return nfserr_bad_xdr;
641 #endif /* CONFIG_NFSD_PNFS */
644 nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp,
645 struct nfs4_sessionid *sessionid)
649 p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN);
651 return nfserr_bad_xdr;
652 memcpy(sessionid->data, p, sizeof(sessionid->data));
656 /* Defined in Appendix A of RFC 5531 */
658 nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp,
659 struct nfsd4_cb_sec *cbs)
661 u32 stamp, gidcount, uid, gid;
664 if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0)
665 return nfserr_bad_xdr;
667 status = nfsd4_decode_ignored_string(argp, 255);
670 if (xdr_stream_decode_u32(argp->xdr, &uid) < 0)
671 return nfserr_bad_xdr;
672 if (xdr_stream_decode_u32(argp->xdr, &gid) < 0)
673 return nfserr_bad_xdr;
674 if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0)
675 return nfserr_bad_xdr;
677 return nfserr_bad_xdr;
678 p = xdr_inline_decode(argp->xdr, gidcount << 2);
680 return nfserr_bad_xdr;
681 if (cbs->flavor == (u32)(-1)) {
682 struct user_namespace *userns = nfsd_user_namespace(argp->rqstp);
684 kuid_t kuid = make_kuid(userns, uid);
685 kgid_t kgid = make_kgid(userns, gid);
686 if (uid_valid(kuid) && gid_valid(kgid)) {
689 cbs->flavor = RPC_AUTH_UNIX;
691 dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n");
699 nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp,
700 struct nfsd4_cb_sec *cbs)
705 dprintk("RPC_AUTH_GSS callback secflavor not supported!\n");
707 if (xdr_stream_decode_u32(argp->xdr, &service) < 0)
708 return nfserr_bad_xdr;
709 if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY)
710 return nfserr_bad_xdr;
711 /* gcbp_handle_from_server */
712 status = nfsd4_decode_ignored_string(argp, 0);
715 /* gcbp_handle_from_client */
716 status = nfsd4_decode_ignored_string(argp, 0);
723 /* a counted array of callback_sec_parms4 items */
725 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
727 u32 i, secflavor, nr_secflavs;
730 /* callback_sec_params4 */
731 if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0)
732 return nfserr_bad_xdr;
734 cbs->flavor = (u32)(-1);
736 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
739 for (i = 0; i < nr_secflavs; ++i) {
740 if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0)
741 return nfserr_bad_xdr;
745 if (cbs->flavor == (u32)(-1))
746 cbs->flavor = RPC_AUTH_NULL;
749 status = nfsd4_decode_authsys_parms(argp, cbs);
754 status = nfsd4_decode_gss_cb_handles4(argp, cbs);
768 * NFSv4 operation argument decoders
772 nfsd4_decode_access(struct nfsd4_compoundargs *argp,
775 struct nfsd4_access *access = &u->access;
776 if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0)
777 return nfserr_bad_xdr;
782 nfsd4_decode_close(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
784 struct nfsd4_close *close = &u->close;
785 if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0)
786 return nfserr_bad_xdr;
787 return nfsd4_decode_stateid4(argp, &close->cl_stateid);
792 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
794 struct nfsd4_commit *commit = &u->commit;
795 if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0)
796 return nfserr_bad_xdr;
797 if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0)
798 return nfserr_bad_xdr;
799 memset(&commit->co_verf, 0, sizeof(commit->co_verf));
804 nfsd4_decode_create(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
806 struct nfsd4_create *create = &u->create;
809 memset(create, 0, sizeof(*create));
810 if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0)
811 return nfserr_bad_xdr;
812 switch (create->cr_type) {
814 if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0)
815 return nfserr_bad_xdr;
816 p = xdr_inline_decode(argp->xdr, create->cr_datalen);
818 return nfserr_bad_xdr;
819 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen);
820 if (!create->cr_data)
821 return nfserr_jukebox;
825 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0)
826 return nfserr_bad_xdr;
827 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0)
828 return nfserr_bad_xdr;
836 status = nfsd4_decode_component4(argp, &create->cr_name,
837 &create->cr_namelen);
840 status = nfsd4_decode_fattr4(argp, create->cr_bmval,
841 ARRAY_SIZE(create->cr_bmval),
842 &create->cr_iattr, &create->cr_acl,
843 &create->cr_label, &create->cr_umask);
851 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
853 struct nfsd4_delegreturn *dr = &u->delegreturn;
854 return nfsd4_decode_stateid4(argp, &dr->dr_stateid);
858 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
860 struct nfsd4_getattr *getattr = &u->getattr;
861 memset(getattr, 0, sizeof(*getattr));
862 return nfsd4_decode_bitmap4(argp, getattr->ga_bmval,
863 ARRAY_SIZE(getattr->ga_bmval));
867 nfsd4_decode_link(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
869 struct nfsd4_link *link = &u->link;
870 memset(link, 0, sizeof(*link));
871 return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen);
875 nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp,
876 struct nfsd4_lock *lock)
880 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0)
881 return nfserr_bad_xdr;
882 status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid);
885 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0)
886 return nfserr_bad_xdr;
887 return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid,
888 &lock->lk_new_owner);
892 nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp,
893 struct nfsd4_lock *lock)
897 status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid);
900 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0)
901 return nfserr_bad_xdr;
907 nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
909 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0)
910 return nfserr_bad_xdr;
912 return nfsd4_decode_open_to_lock_owner4(argp, lock);
913 return nfsd4_decode_exist_lock_owner4(argp, lock);
917 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
919 struct nfsd4_lock *lock = &u->lock;
920 memset(lock, 0, sizeof(*lock));
921 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0)
922 return nfserr_bad_xdr;
923 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
924 return nfserr_bad_xdr;
925 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0)
926 return nfserr_bad_xdr;
927 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0)
928 return nfserr_bad_xdr;
929 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0)
930 return nfserr_bad_xdr;
931 return nfsd4_decode_locker4(argp, lock);
935 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
937 struct nfsd4_lockt *lockt = &u->lockt;
938 memset(lockt, 0, sizeof(*lockt));
939 if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0)
940 return nfserr_bad_xdr;
941 if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
942 return nfserr_bad_xdr;
943 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0)
944 return nfserr_bad_xdr;
945 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0)
946 return nfserr_bad_xdr;
947 return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid,
952 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
954 struct nfsd4_locku *locku = &u->locku;
957 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0)
958 return nfserr_bad_xdr;
959 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
960 return nfserr_bad_xdr;
961 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0)
962 return nfserr_bad_xdr;
963 status = nfsd4_decode_stateid4(argp, &locku->lu_stateid);
966 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0)
967 return nfserr_bad_xdr;
968 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0)
969 return nfserr_bad_xdr;
975 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
977 struct nfsd4_lookup *lookup = &u->lookup;
978 return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len);
982 nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
986 if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0)
987 return nfserr_bad_xdr;
988 switch (open->op_createmode) {
989 case NFS4_CREATE_UNCHECKED:
990 case NFS4_CREATE_GUARDED:
991 status = nfsd4_decode_fattr4(argp, open->op_bmval,
992 ARRAY_SIZE(open->op_bmval),
993 &open->op_iattr, &open->op_acl,
994 &open->op_label, &open->op_umask);
998 case NFS4_CREATE_EXCLUSIVE:
999 status = nfsd4_decode_verifier4(argp, &open->op_verf);
1003 case NFS4_CREATE_EXCLUSIVE4_1:
1004 if (argp->minorversion < 1)
1005 return nfserr_bad_xdr;
1006 status = nfsd4_decode_verifier4(argp, &open->op_verf);
1009 status = nfsd4_decode_fattr4(argp, open->op_bmval,
1010 ARRAY_SIZE(open->op_bmval),
1011 &open->op_iattr, &open->op_acl,
1012 &open->op_label, &open->op_umask);
1017 return nfserr_bad_xdr;
1024 nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
1028 if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0)
1029 return nfserr_bad_xdr;
1030 switch (open->op_create) {
1031 case NFS4_OPEN_NOCREATE:
1033 case NFS4_OPEN_CREATE:
1034 status = nfsd4_decode_createhow4(argp, open);
1039 return nfserr_bad_xdr;
1045 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
1049 if (xdr_stream_decode_u32(argp->xdr, &w) < 0)
1050 return nfserr_bad_xdr;
1051 *share_access = w & NFS4_SHARE_ACCESS_MASK;
1052 *deleg_want = w & NFS4_SHARE_WANT_MASK;
1054 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
1056 switch (w & NFS4_SHARE_ACCESS_MASK) {
1057 case NFS4_SHARE_ACCESS_READ:
1058 case NFS4_SHARE_ACCESS_WRITE:
1059 case NFS4_SHARE_ACCESS_BOTH:
1062 return nfserr_bad_xdr;
1064 w &= ~NFS4_SHARE_ACCESS_MASK;
1067 if (!argp->minorversion)
1068 return nfserr_bad_xdr;
1069 switch (w & NFS4_SHARE_WANT_MASK) {
1070 case NFS4_SHARE_WANT_NO_PREFERENCE:
1071 case NFS4_SHARE_WANT_READ_DELEG:
1072 case NFS4_SHARE_WANT_WRITE_DELEG:
1073 case NFS4_SHARE_WANT_ANY_DELEG:
1074 case NFS4_SHARE_WANT_NO_DELEG:
1075 case NFS4_SHARE_WANT_CANCEL:
1078 return nfserr_bad_xdr;
1080 w &= ~NFS4_SHARE_WANT_MASK;
1084 if (!deleg_when) /* open_downgrade */
1085 return nfserr_inval;
1087 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
1088 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
1089 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
1090 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
1093 return nfserr_bad_xdr;
1096 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
1098 if (xdr_stream_decode_u32(argp->xdr, x) < 0)
1099 return nfserr_bad_xdr;
1100 /* Note: unlike access bits, deny bits may be zero. */
1101 if (*x & ~NFS4_SHARE_DENY_BOTH)
1102 return nfserr_bad_xdr;
1108 nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp,
1109 struct nfsd4_open *open)
1113 if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0)
1114 return nfserr_bad_xdr;
1115 switch (open->op_claim_type) {
1116 case NFS4_OPEN_CLAIM_NULL:
1117 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
1118 status = nfsd4_decode_component4(argp, &open->op_fname,
1119 &open->op_fnamelen);
1123 case NFS4_OPEN_CLAIM_PREVIOUS:
1124 if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0)
1125 return nfserr_bad_xdr;
1127 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1128 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1131 status = nfsd4_decode_component4(argp, &open->op_fname,
1132 &open->op_fnamelen);
1136 case NFS4_OPEN_CLAIM_FH:
1137 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1138 if (argp->minorversion < 1)
1139 return nfserr_bad_xdr;
1142 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1143 if (argp->minorversion < 1)
1144 return nfserr_bad_xdr;
1145 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1150 return nfserr_bad_xdr;
1157 nfsd4_decode_open(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1159 struct nfsd4_open *open = &u->open;
1163 memset(open, 0, sizeof(*open));
1165 if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0)
1166 return nfserr_bad_xdr;
1167 /* deleg_want is ignored */
1168 status = nfsd4_decode_share_access(argp, &open->op_share_access,
1169 &open->op_deleg_want, &dummy);
1172 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
1175 status = nfsd4_decode_state_owner4(argp, &open->op_clientid,
1179 status = nfsd4_decode_openflag4(argp, open);
1182 return nfsd4_decode_open_claim4(argp, open);
1186 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp,
1187 union nfsd4_op_u *u)
1189 struct nfsd4_open_confirm *open_conf = &u->open_confirm;
1192 if (argp->minorversion >= 1)
1193 return nfserr_notsupp;
1195 status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid);
1198 if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0)
1199 return nfserr_bad_xdr;
1201 memset(&open_conf->oc_resp_stateid, 0,
1202 sizeof(open_conf->oc_resp_stateid));
1207 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp,
1208 union nfsd4_op_u *u)
1210 struct nfsd4_open_downgrade *open_down = &u->open_downgrade;
1213 memset(open_down, 0, sizeof(*open_down));
1214 status = nfsd4_decode_stateid4(argp, &open_down->od_stateid);
1217 if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0)
1218 return nfserr_bad_xdr;
1219 /* deleg_want is ignored */
1220 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
1221 &open_down->od_deleg_want, NULL);
1224 return nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
1228 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1230 struct nfsd4_putfh *putfh = &u->putfh;
1233 if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0)
1234 return nfserr_bad_xdr;
1235 if (putfh->pf_fhlen > NFS4_FHSIZE)
1236 return nfserr_bad_xdr;
1237 p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen);
1239 return nfserr_bad_xdr;
1240 putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen);
1241 if (!putfh->pf_fhval)
1242 return nfserr_jukebox;
1244 putfh->no_verify = false;
1249 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p)
1251 if (argp->minorversion == 0)
1253 return nfserr_notsupp;
1257 nfsd4_decode_read(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1259 struct nfsd4_read *read = &u->read;
1262 memset(read, 0, sizeof(*read));
1263 status = nfsd4_decode_stateid4(argp, &read->rd_stateid);
1266 if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0)
1267 return nfserr_bad_xdr;
1268 if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0)
1269 return nfserr_bad_xdr;
1275 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1277 struct nfsd4_readdir *readdir = &u->readdir;
1280 memset(readdir, 0, sizeof(*readdir));
1281 if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0)
1282 return nfserr_bad_xdr;
1283 status = nfsd4_decode_verifier4(argp, &readdir->rd_verf);
1286 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0)
1287 return nfserr_bad_xdr;
1288 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0)
1289 return nfserr_bad_xdr;
1290 if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval,
1291 ARRAY_SIZE(readdir->rd_bmval)) < 0)
1292 return nfserr_bad_xdr;
1298 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1300 struct nfsd4_remove *remove = &u->remove;
1301 memset(&remove->rm_cinfo, 0, sizeof(remove->rm_cinfo));
1302 return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen);
1306 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1308 struct nfsd4_rename *rename = &u->rename;
1311 memset(rename, 0, sizeof(*rename));
1312 status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen);
1315 return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen);
1319 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1321 clientid_t *clientid = &u->renew;
1322 return nfsd4_decode_clientid4(argp, clientid);
1326 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1327 union nfsd4_op_u *u)
1329 struct nfsd4_secinfo *secinfo = &u->secinfo;
1330 secinfo->si_exp = NULL;
1331 return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen);
1335 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1337 struct nfsd4_setattr *setattr = &u->setattr;
1340 memset(setattr, 0, sizeof(*setattr));
1341 status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid);
1344 return nfsd4_decode_fattr4(argp, setattr->sa_bmval,
1345 ARRAY_SIZE(setattr->sa_bmval),
1346 &setattr->sa_iattr, &setattr->sa_acl,
1347 &setattr->sa_label, NULL);
1351 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1353 struct nfsd4_setclientid *setclientid = &u->setclientid;
1356 memset(setclientid, 0, sizeof(*setclientid));
1358 if (argp->minorversion >= 1)
1359 return nfserr_notsupp;
1361 status = nfsd4_decode_verifier4(argp, &setclientid->se_verf);
1364 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1367 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0)
1368 return nfserr_bad_xdr;
1369 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0)
1370 return nfserr_bad_xdr;
1371 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len);
1373 return nfserr_bad_xdr;
1374 setclientid->se_callback_netid_val = svcxdr_savemem(argp, p,
1375 setclientid->se_callback_netid_len);
1376 if (!setclientid->se_callback_netid_val)
1377 return nfserr_jukebox;
1379 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0)
1380 return nfserr_bad_xdr;
1381 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len);
1383 return nfserr_bad_xdr;
1384 setclientid->se_callback_addr_val = svcxdr_savemem(argp, p,
1385 setclientid->se_callback_addr_len);
1386 if (!setclientid->se_callback_addr_val)
1387 return nfserr_jukebox;
1388 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0)
1389 return nfserr_bad_xdr;
1395 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp,
1396 union nfsd4_op_u *u)
1398 struct nfsd4_setclientid_confirm *scd_c = &u->setclientid_confirm;
1401 if (argp->minorversion >= 1)
1402 return nfserr_notsupp;
1404 status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid);
1407 return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm);
1410 /* Also used for NVERIFY */
1412 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1414 struct nfsd4_verify *verify = &u->verify;
1417 memset(verify, 0, sizeof(*verify));
1419 status = nfsd4_decode_bitmap4(argp, verify->ve_bmval,
1420 ARRAY_SIZE(verify->ve_bmval));
1424 /* For convenience's sake, we compare raw xdr'd attributes in
1425 * nfsd4_proc_verify */
1427 if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0)
1428 return nfserr_bad_xdr;
1429 p = xdr_inline_decode(argp->xdr, verify->ve_attrlen);
1431 return nfserr_bad_xdr;
1432 verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen);
1433 if (!verify->ve_attrval)
1434 return nfserr_jukebox;
1440 nfsd4_decode_write(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1442 struct nfsd4_write *write = &u->write;
1445 status = nfsd4_decode_stateid4(argp, &write->wr_stateid);
1448 if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0)
1449 return nfserr_bad_xdr;
1450 if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0)
1451 return nfserr_bad_xdr;
1452 if (write->wr_stable_how > NFS_FILE_SYNC)
1453 return nfserr_bad_xdr;
1454 if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0)
1455 return nfserr_bad_xdr;
1456 if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen))
1457 return nfserr_bad_xdr;
1459 write->wr_bytes_written = 0;
1460 write->wr_how_written = 0;
1461 memset(&write->wr_verifier, 0, sizeof(write->wr_verifier));
1466 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp,
1467 union nfsd4_op_u *u)
1469 struct nfsd4_release_lockowner *rlockowner = &u->release_lockowner;
1472 if (argp->minorversion >= 1)
1473 return nfserr_notsupp;
1475 status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid,
1476 &rlockowner->rl_owner);
1480 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1481 return nfserr_inval;
1486 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp,
1487 union nfsd4_op_u *u)
1489 struct nfsd4_backchannel_ctl *bc = &u->backchannel_ctl;
1490 memset(bc, 0, sizeof(*bc));
1491 if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0)
1492 return nfserr_bad_xdr;
1493 return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
1496 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp,
1497 union nfsd4_op_u *u)
1499 struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session;
1500 u32 use_conn_in_rdma_mode;
1503 memset(bcts, 0, sizeof(*bcts));
1504 status = nfsd4_decode_sessionid4(argp, &bcts->sessionid);
1507 if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0)
1508 return nfserr_bad_xdr;
1509 if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0)
1510 return nfserr_bad_xdr;
1516 nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp,
1517 struct nfsd4_exchange_id *exid)
1521 status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce,
1522 ARRAY_SIZE(exid->spo_must_enforce));
1524 return nfserr_bad_xdr;
1525 status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow,
1526 ARRAY_SIZE(exid->spo_must_allow));
1528 return nfserr_bad_xdr;
1534 * This implementation currently does not support SP4_SSV.
1535 * This decoder simply skips over these arguments.
1537 static noinline __be32
1538 nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp,
1539 struct nfsd4_exchange_id *exid)
1541 u32 count, window, num_gss_handles;
1545 status = nfsd4_decode_state_protect_ops(argp, exid);
1549 /* ssp_hash_algs<> */
1550 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1551 return nfserr_bad_xdr;
1553 status = nfsd4_decode_ignored_string(argp, 0);
1558 /* ssp_encr_algs<> */
1559 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1560 return nfserr_bad_xdr;
1562 status = nfsd4_decode_ignored_string(argp, 0);
1567 if (xdr_stream_decode_u32(argp->xdr, &window) < 0)
1568 return nfserr_bad_xdr;
1569 if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0)
1570 return nfserr_bad_xdr;
1576 nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp,
1577 struct nfsd4_exchange_id *exid)
1581 if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0)
1582 return nfserr_bad_xdr;
1583 switch (exid->spa_how) {
1587 status = nfsd4_decode_state_protect_ops(argp, exid);
1592 status = nfsd4_decode_ssv_sp_parms(argp, exid);
1597 return nfserr_bad_xdr;
1604 nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp,
1605 struct nfsd4_exchange_id *exid)
1610 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1611 return nfserr_bad_xdr;
1616 /* Note that RFC 8881 places no length limit on
1617 * nii_domain, but this implementation permits no
1618 * more than NFS4_OPAQUE_LIMIT bytes */
1619 status = nfsd4_decode_opaque(argp, &exid->nii_domain);
1622 /* Note that RFC 8881 places no length limit on
1623 * nii_name, but this implementation permits no
1624 * more than NFS4_OPAQUE_LIMIT bytes */
1625 status = nfsd4_decode_opaque(argp, &exid->nii_name);
1628 status = nfsd4_decode_nfstime4(argp, &exid->nii_time);
1633 return nfserr_bad_xdr;
1640 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1641 union nfsd4_op_u *u)
1643 struct nfsd4_exchange_id *exid = &u->exchange_id;
1646 memset(exid, 0, sizeof(*exid));
1647 status = nfsd4_decode_verifier4(argp, &exid->verifier);
1650 status = nfsd4_decode_opaque(argp, &exid->clname);
1653 if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0)
1654 return nfserr_bad_xdr;
1655 status = nfsd4_decode_state_protect4_a(argp, exid);
1658 return nfsd4_decode_nfs_impl_id4(argp, exid);
1662 nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp,
1663 struct nfsd4_channel_attrs *ca)
1667 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7);
1669 return nfserr_bad_xdr;
1671 /* headerpadsz is ignored */
1673 ca->maxreq_sz = be32_to_cpup(p++);
1674 ca->maxresp_sz = be32_to_cpup(p++);
1675 ca->maxresp_cached = be32_to_cpup(p++);
1676 ca->maxops = be32_to_cpup(p++);
1677 ca->maxreqs = be32_to_cpup(p++);
1678 ca->nr_rdma_attrs = be32_to_cpup(p);
1679 switch (ca->nr_rdma_attrs) {
1683 if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0)
1684 return nfserr_bad_xdr;
1687 return nfserr_bad_xdr;
1694 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1695 union nfsd4_op_u *u)
1697 struct nfsd4_create_session *sess = &u->create_session;
1700 memset(sess, 0, sizeof(*sess));
1701 status = nfsd4_decode_clientid4(argp, &sess->clientid);
1704 if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0)
1705 return nfserr_bad_xdr;
1706 if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0)
1707 return nfserr_bad_xdr;
1708 status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel);
1711 status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel);
1714 if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0)
1715 return nfserr_bad_xdr;
1716 return nfsd4_decode_cb_sec(argp, &sess->cb_sec);
1720 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1721 union nfsd4_op_u *u)
1723 struct nfsd4_destroy_session *destroy_session = &u->destroy_session;
1724 return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid);
1728 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1729 union nfsd4_op_u *u)
1731 struct nfsd4_free_stateid *free_stateid = &u->free_stateid;
1732 return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid);
1735 #ifdef CONFIG_NFSD_PNFS
1737 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp,
1738 union nfsd4_op_u *u)
1740 struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo;
1743 memset(gdev, 0, sizeof(*gdev));
1744 status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid);
1747 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0)
1748 return nfserr_bad_xdr;
1749 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0)
1750 return nfserr_bad_xdr;
1751 if (xdr_stream_decode_uint32_array(argp->xdr,
1752 &gdev->gd_notify_types, 1) < 0)
1753 return nfserr_bad_xdr;
1759 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp,
1760 union nfsd4_op_u *u)
1762 struct nfsd4_layoutcommit *lcp = &u->layoutcommit;
1765 memset(lcp, 0, sizeof(*lcp));
1766 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0)
1767 return nfserr_bad_xdr;
1768 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0)
1769 return nfserr_bad_xdr;
1770 if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0)
1771 return nfserr_bad_xdr;
1772 status = nfsd4_decode_stateid4(argp, &lcp->lc_sid);
1775 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0)
1776 return nfserr_bad_xdr;
1777 if (lcp->lc_newoffset) {
1778 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0)
1779 return nfserr_bad_xdr;
1781 lcp->lc_last_wr = 0;
1782 p = xdr_inline_decode(argp->xdr, XDR_UNIT);
1784 return nfserr_bad_xdr;
1785 if (xdr_item_is_present(p)) {
1786 status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime);
1790 lcp->lc_mtime.tv_nsec = UTIME_NOW;
1792 return nfsd4_decode_layoutupdate4(argp, lcp);
1796 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp,
1797 union nfsd4_op_u *u)
1799 struct nfsd4_layoutget *lgp = &u->layoutget;
1802 memset(lgp, 0, sizeof(*lgp));
1803 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0)
1804 return nfserr_bad_xdr;
1805 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0)
1806 return nfserr_bad_xdr;
1807 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0)
1808 return nfserr_bad_xdr;
1809 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0)
1810 return nfserr_bad_xdr;
1811 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0)
1812 return nfserr_bad_xdr;
1813 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0)
1814 return nfserr_bad_xdr;
1815 status = nfsd4_decode_stateid4(argp, &lgp->lg_sid);
1818 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0)
1819 return nfserr_bad_xdr;
1825 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp,
1826 union nfsd4_op_u *u)
1828 struct nfsd4_layoutreturn *lrp = &u->layoutreturn;
1829 memset(lrp, 0, sizeof(*lrp));
1830 if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0)
1831 return nfserr_bad_xdr;
1832 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0)
1833 return nfserr_bad_xdr;
1834 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0)
1835 return nfserr_bad_xdr;
1836 return nfsd4_decode_layoutreturn4(argp, lrp);
1838 #endif /* CONFIG_NFSD_PNFS */
1840 static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1841 union nfsd4_op_u *u)
1843 struct nfsd4_secinfo_no_name *sin = &u->secinfo_no_name;
1844 if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0)
1845 return nfserr_bad_xdr;
1847 sin->sin_exp = NULL;
1852 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1853 union nfsd4_op_u *u)
1855 struct nfsd4_sequence *seq = &u->sequence;
1858 status = nfsd4_decode_sessionid4(argp, &seq->sessionid);
1861 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4);
1863 return nfserr_bad_xdr;
1864 seq->seqid = be32_to_cpup(p++);
1865 seq->slotid = be32_to_cpup(p++);
1866 seq->maxslots = be32_to_cpup(p++);
1867 seq->cachethis = be32_to_cpup(p);
1869 seq->status_flags = 0;
1874 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp,
1875 union nfsd4_op_u *u)
1877 struct nfsd4_test_stateid *test_stateid = &u->test_stateid;
1878 struct nfsd4_test_stateid_id *stateid;
1882 memset(test_stateid, 0, sizeof(*test_stateid));
1883 if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0)
1884 return nfserr_bad_xdr;
1886 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1887 for (i = 0; i < test_stateid->ts_num_ids; i++) {
1888 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid));
1890 return nfserr_jukebox;
1891 INIT_LIST_HEAD(&stateid->ts_id_list);
1892 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1893 status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid);
1901 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp,
1902 union nfsd4_op_u *u)
1904 struct nfsd4_destroy_clientid *dc = &u->destroy_clientid;
1905 return nfsd4_decode_clientid4(argp, &dc->clientid);
1908 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp,
1909 union nfsd4_op_u *u)
1911 struct nfsd4_reclaim_complete *rc = &u->reclaim_complete;
1912 if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0)
1913 return nfserr_bad_xdr;
1918 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp,
1919 union nfsd4_op_u *u)
1921 struct nfsd4_fallocate *fallocate = &u->allocate;
1924 status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid);
1927 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0)
1928 return nfserr_bad_xdr;
1929 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0)
1930 return nfserr_bad_xdr;
1935 static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp,
1936 struct nl4_server *ns)
1938 struct nfs42_netaddr *naddr;
1941 if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0)
1942 return nfserr_bad_xdr;
1944 /* currently support for 1 inter-server source server */
1945 switch (ns->nl4_type) {
1947 naddr = &ns->u.nl4_addr;
1949 if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0)
1950 return nfserr_bad_xdr;
1951 if (naddr->netid_len > RPCBIND_MAXNETIDLEN)
1952 return nfserr_bad_xdr;
1954 p = xdr_inline_decode(argp->xdr, naddr->netid_len);
1956 return nfserr_bad_xdr;
1957 memcpy(naddr->netid, p, naddr->netid_len);
1959 if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0)
1960 return nfserr_bad_xdr;
1961 if (naddr->addr_len > RPCBIND_MAXUADDRLEN)
1962 return nfserr_bad_xdr;
1964 p = xdr_inline_decode(argp->xdr, naddr->addr_len);
1966 return nfserr_bad_xdr;
1967 memcpy(naddr->addr, p, naddr->addr_len);
1970 return nfserr_bad_xdr;
1977 nfsd4_decode_copy(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1979 struct nfsd4_copy *copy = &u->copy;
1980 u32 consecutive, i, count, sync;
1981 struct nl4_server *ns_dummy;
1984 memset(copy, 0, sizeof(*copy));
1985 status = nfsd4_decode_stateid4(argp, ©->cp_src_stateid);
1988 status = nfsd4_decode_stateid4(argp, ©->cp_dst_stateid);
1991 if (xdr_stream_decode_u64(argp->xdr, ©->cp_src_pos) < 0)
1992 return nfserr_bad_xdr;
1993 if (xdr_stream_decode_u64(argp->xdr, ©->cp_dst_pos) < 0)
1994 return nfserr_bad_xdr;
1995 if (xdr_stream_decode_u64(argp->xdr, ©->cp_count) < 0)
1996 return nfserr_bad_xdr;
1997 /* ca_consecutive: we always do consecutive copies */
1998 if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0)
1999 return nfserr_bad_xdr;
2000 if (xdr_stream_decode_bool(argp->xdr, &sync) < 0)
2001 return nfserr_bad_xdr;
2002 nfsd4_copy_set_sync(copy, sync);
2004 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
2005 return nfserr_bad_xdr;
2006 copy->cp_src = svcxdr_tmpalloc(argp, sizeof(*copy->cp_src));
2007 if (copy->cp_src == NULL)
2008 return nfserr_jukebox;
2009 if (count == 0) { /* intra-server copy */
2010 __set_bit(NFSD4_COPY_F_INTRA, ©->cp_flags);
2014 /* decode all the supplied server addresses but use only the first */
2015 status = nfsd4_decode_nl4_server(argp, copy->cp_src);
2019 ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL);
2020 if (ns_dummy == NULL)
2021 return nfserr_jukebox;
2022 for (i = 0; i < count - 1; i++) {
2023 status = nfsd4_decode_nl4_server(argp, ns_dummy);
2035 nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp,
2036 union nfsd4_op_u *u)
2038 struct nfsd4_copy_notify *cn = &u->copy_notify;
2041 memset(cn, 0, sizeof(*cn));
2042 cn->cpn_src = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_src));
2043 if (cn->cpn_src == NULL)
2044 return nfserr_jukebox;
2045 cn->cpn_dst = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_dst));
2046 if (cn->cpn_dst == NULL)
2047 return nfserr_jukebox;
2049 status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid);
2052 return nfsd4_decode_nl4_server(argp, cn->cpn_dst);
2056 nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp,
2057 union nfsd4_op_u *u)
2059 struct nfsd4_offload_status *os = &u->offload_status;
2062 return nfsd4_decode_stateid4(argp, &os->stateid);
2066 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
2068 struct nfsd4_seek *seek = &u->seek;
2071 status = nfsd4_decode_stateid4(argp, &seek->seek_stateid);
2074 if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0)
2075 return nfserr_bad_xdr;
2076 if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0)
2077 return nfserr_bad_xdr;
2085 nfsd4_decode_clone(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
2087 struct nfsd4_clone *clone = &u->clone;
2090 status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid);
2093 status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid);
2096 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0)
2097 return nfserr_bad_xdr;
2098 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0)
2099 return nfserr_bad_xdr;
2100 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0)
2101 return nfserr_bad_xdr;
2107 * XDR data that is more than PAGE_SIZE in size is normally part of a
2108 * read or write. However, the size of extended attributes is limited
2109 * by the maximum request size, and then further limited by the underlying
2110 * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX
2111 * is 64k). Since there is no kvec- or page-based interface to xattrs,
2112 * and we're not dealing with contiguous pages, we need to do some copying.
2116 * Decode data into buffer.
2119 nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr,
2120 char **bufp, u32 buflen)
2122 struct page **pages = xdr->pages;
2123 struct kvec *head = xdr->head;
2127 if (buflen <= head->iov_len) {
2129 * We're in luck, the head has enough space. Just return
2130 * the head, no need for copying.
2132 *bufp = head->iov_base;
2136 tmp = svcxdr_tmpalloc(argp, buflen);
2138 return nfserr_jukebox;
2141 memcpy(dp, head->iov_base, head->iov_len);
2142 buflen -= head->iov_len;
2143 dp += head->iov_len;
2145 while (buflen > 0) {
2146 len = min_t(u32, buflen, PAGE_SIZE);
2147 memcpy(dp, page_address(*pages), len);
2159 * Get a user extended attribute name from the XDR buffer.
2160 * It will not have the "user." prefix, so prepend it.
2161 * Lastly, check for nul characters in the name.
2164 nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep)
2166 char *name, *sp, *dp;
2170 if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0)
2171 return nfserr_bad_xdr;
2172 if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN))
2173 return nfserr_nametoolong;
2175 return nfserr_bad_xdr;
2176 p = xdr_inline_decode(argp->xdr, namelen);
2178 return nfserr_bad_xdr;
2179 name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1);
2181 return nfserr_jukebox;
2182 memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
2185 * Copy the extended attribute name over while checking for 0
2189 dp = name + XATTR_USER_PREFIX_LEN;
2194 return nfserr_bad_xdr;
2205 * A GETXATTR op request comes without a length specifier. We just set the
2206 * maximum length for the reply based on XATTR_SIZE_MAX and the maximum
2207 * channel reply size. nfsd_getxattr will probe the length of the xattr,
2208 * check it against getxa_len, and allocate + return the value.
2211 nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp,
2212 union nfsd4_op_u *u)
2214 struct nfsd4_getxattr *getxattr = &u->getxattr;
2218 memset(getxattr, 0, sizeof(*getxattr));
2219 status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name);
2223 maxcount = svc_max_payload(argp->rqstp);
2224 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2226 getxattr->getxa_len = maxcount;
2231 nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp,
2232 union nfsd4_op_u *u)
2234 struct nfsd4_setxattr *setxattr = &u->setxattr;
2235 u32 flags, maxcount, size;
2238 memset(setxattr, 0, sizeof(*setxattr));
2240 if (xdr_stream_decode_u32(argp->xdr, &flags) < 0)
2241 return nfserr_bad_xdr;
2243 if (flags > SETXATTR4_REPLACE)
2244 return nfserr_inval;
2245 setxattr->setxa_flags = flags;
2247 status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name);
2251 maxcount = svc_max_payload(argp->rqstp);
2252 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2254 if (xdr_stream_decode_u32(argp->xdr, &size) < 0)
2255 return nfserr_bad_xdr;
2256 if (size > maxcount)
2257 return nfserr_xattr2big;
2259 setxattr->setxa_len = size;
2261 struct xdr_buf payload;
2263 if (!xdr_stream_subsegment(argp->xdr, &payload, size))
2264 return nfserr_bad_xdr;
2265 status = nfsd4_vbuf_from_vector(argp, &payload,
2266 &setxattr->setxa_buf, size);
2273 nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp,
2274 union nfsd4_op_u *u)
2276 struct nfsd4_listxattrs *listxattrs = &u->listxattrs;
2279 memset(listxattrs, 0, sizeof(*listxattrs));
2281 if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0)
2282 return nfserr_bad_xdr;
2285 * If the cookie is too large to have even one user.x attribute
2286 * plus trailing '\0' left in a maximum size buffer, it's invalid.
2288 if (listxattrs->lsxa_cookie >=
2289 (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2)))
2290 return nfserr_badcookie;
2292 if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0)
2293 return nfserr_bad_xdr;
2295 /* Always need at least 2 words (length and one character) */
2296 return nfserr_inval;
2298 maxcount = min(maxcount, svc_max_payload(argp->rqstp));
2299 listxattrs->lsxa_maxcount = maxcount;
2305 nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp,
2306 union nfsd4_op_u *u)
2308 struct nfsd4_removexattr *removexattr = &u->removexattr;
2309 memset(removexattr, 0, sizeof(*removexattr));
2310 return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name);
2314 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p)
2320 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p)
2322 return nfserr_notsupp;
2325 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u);
2327 static const nfsd4_dec nfsd4_dec_ops[] = {
2328 [OP_ACCESS] = nfsd4_decode_access,
2329 [OP_CLOSE] = nfsd4_decode_close,
2330 [OP_COMMIT] = nfsd4_decode_commit,
2331 [OP_CREATE] = nfsd4_decode_create,
2332 [OP_DELEGPURGE] = nfsd4_decode_notsupp,
2333 [OP_DELEGRETURN] = nfsd4_decode_delegreturn,
2334 [OP_GETATTR] = nfsd4_decode_getattr,
2335 [OP_GETFH] = nfsd4_decode_noop,
2336 [OP_LINK] = nfsd4_decode_link,
2337 [OP_LOCK] = nfsd4_decode_lock,
2338 [OP_LOCKT] = nfsd4_decode_lockt,
2339 [OP_LOCKU] = nfsd4_decode_locku,
2340 [OP_LOOKUP] = nfsd4_decode_lookup,
2341 [OP_LOOKUPP] = nfsd4_decode_noop,
2342 [OP_NVERIFY] = nfsd4_decode_verify,
2343 [OP_OPEN] = nfsd4_decode_open,
2344 [OP_OPENATTR] = nfsd4_decode_notsupp,
2345 [OP_OPEN_CONFIRM] = nfsd4_decode_open_confirm,
2346 [OP_OPEN_DOWNGRADE] = nfsd4_decode_open_downgrade,
2347 [OP_PUTFH] = nfsd4_decode_putfh,
2348 [OP_PUTPUBFH] = nfsd4_decode_putpubfh,
2349 [OP_PUTROOTFH] = nfsd4_decode_noop,
2350 [OP_READ] = nfsd4_decode_read,
2351 [OP_READDIR] = nfsd4_decode_readdir,
2352 [OP_READLINK] = nfsd4_decode_noop,
2353 [OP_REMOVE] = nfsd4_decode_remove,
2354 [OP_RENAME] = nfsd4_decode_rename,
2355 [OP_RENEW] = nfsd4_decode_renew,
2356 [OP_RESTOREFH] = nfsd4_decode_noop,
2357 [OP_SAVEFH] = nfsd4_decode_noop,
2358 [OP_SECINFO] = nfsd4_decode_secinfo,
2359 [OP_SETATTR] = nfsd4_decode_setattr,
2360 [OP_SETCLIENTID] = nfsd4_decode_setclientid,
2361 [OP_SETCLIENTID_CONFIRM] = nfsd4_decode_setclientid_confirm,
2362 [OP_VERIFY] = nfsd4_decode_verify,
2363 [OP_WRITE] = nfsd4_decode_write,
2364 [OP_RELEASE_LOCKOWNER] = nfsd4_decode_release_lockowner,
2366 /* new operations for NFSv4.1 */
2367 [OP_BACKCHANNEL_CTL] = nfsd4_decode_backchannel_ctl,
2368 [OP_BIND_CONN_TO_SESSION] = nfsd4_decode_bind_conn_to_session,
2369 [OP_EXCHANGE_ID] = nfsd4_decode_exchange_id,
2370 [OP_CREATE_SESSION] = nfsd4_decode_create_session,
2371 [OP_DESTROY_SESSION] = nfsd4_decode_destroy_session,
2372 [OP_FREE_STATEID] = nfsd4_decode_free_stateid,
2373 [OP_GET_DIR_DELEGATION] = nfsd4_decode_notsupp,
2374 #ifdef CONFIG_NFSD_PNFS
2375 [OP_GETDEVICEINFO] = nfsd4_decode_getdeviceinfo,
2376 [OP_GETDEVICELIST] = nfsd4_decode_notsupp,
2377 [OP_LAYOUTCOMMIT] = nfsd4_decode_layoutcommit,
2378 [OP_LAYOUTGET] = nfsd4_decode_layoutget,
2379 [OP_LAYOUTRETURN] = nfsd4_decode_layoutreturn,
2381 [OP_GETDEVICEINFO] = nfsd4_decode_notsupp,
2382 [OP_GETDEVICELIST] = nfsd4_decode_notsupp,
2383 [OP_LAYOUTCOMMIT] = nfsd4_decode_notsupp,
2384 [OP_LAYOUTGET] = nfsd4_decode_notsupp,
2385 [OP_LAYOUTRETURN] = nfsd4_decode_notsupp,
2387 [OP_SECINFO_NO_NAME] = nfsd4_decode_secinfo_no_name,
2388 [OP_SEQUENCE] = nfsd4_decode_sequence,
2389 [OP_SET_SSV] = nfsd4_decode_notsupp,
2390 [OP_TEST_STATEID] = nfsd4_decode_test_stateid,
2391 [OP_WANT_DELEGATION] = nfsd4_decode_notsupp,
2392 [OP_DESTROY_CLIENTID] = nfsd4_decode_destroy_clientid,
2393 [OP_RECLAIM_COMPLETE] = nfsd4_decode_reclaim_complete,
2395 /* new operations for NFSv4.2 */
2396 [OP_ALLOCATE] = nfsd4_decode_fallocate,
2397 [OP_COPY] = nfsd4_decode_copy,
2398 [OP_COPY_NOTIFY] = nfsd4_decode_copy_notify,
2399 [OP_DEALLOCATE] = nfsd4_decode_fallocate,
2400 [OP_IO_ADVISE] = nfsd4_decode_notsupp,
2401 [OP_LAYOUTERROR] = nfsd4_decode_notsupp,
2402 [OP_LAYOUTSTATS] = nfsd4_decode_notsupp,
2403 [OP_OFFLOAD_CANCEL] = nfsd4_decode_offload_status,
2404 [OP_OFFLOAD_STATUS] = nfsd4_decode_offload_status,
2405 [OP_READ_PLUS] = nfsd4_decode_read,
2406 [OP_SEEK] = nfsd4_decode_seek,
2407 [OP_WRITE_SAME] = nfsd4_decode_notsupp,
2408 [OP_CLONE] = nfsd4_decode_clone,
2409 /* RFC 8276 extended atributes operations */
2410 [OP_GETXATTR] = nfsd4_decode_getxattr,
2411 [OP_SETXATTR] = nfsd4_decode_setxattr,
2412 [OP_LISTXATTRS] = nfsd4_decode_listxattrs,
2413 [OP_REMOVEXATTR] = nfsd4_decode_removexattr,
2417 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
2419 if (op->opnum < FIRST_NFS4_OP)
2421 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
2423 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
2425 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
2431 nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
2433 struct nfsd4_op *op;
2434 bool cachethis = false;
2435 int auth_slack= argp->rqstp->rq_auth_slack;
2436 int max_reply = auth_slack + 8; /* opcnt, status */
2442 if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0)
2444 max_reply += XDR_UNIT;
2446 if (unlikely(argp->taglen)) {
2447 if (argp->taglen > NFSD4_MAX_TAGLEN)
2449 p = xdr_inline_decode(argp->xdr, argp->taglen);
2452 argp->tag = svcxdr_savemem(argp, p, argp->taglen);
2455 max_reply += xdr_align_size(argp->taglen);
2458 if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0)
2460 if (xdr_stream_decode_u32(argp->xdr, &argp->client_opcnt) < 0)
2462 argp->opcnt = min_t(u32, argp->client_opcnt,
2463 NFSD_MAX_OPS_PER_COMPOUND);
2465 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
2466 argp->ops = vcalloc(argp->opcnt, sizeof(*argp->ops));
2468 argp->ops = argp->iops;
2473 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
2476 for (i = 0; i < argp->opcnt; i++) {
2481 if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0)
2483 if (nfsd4_opnum_in_range(argp, op)) {
2484 op->opdesc = OPDESC(op);
2485 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
2486 if (op->status != nfs_ok)
2487 trace_nfsd_compound_decode_err(argp->rqstp,
2492 op->opnum = OP_ILLEGAL;
2493 op->status = nfserr_op_illegal;
2497 * We'll try to cache the result in the DRC if any one
2498 * op in the compound wants to be cached:
2500 cachethis |= nfsd4_cache_this_op(op);
2502 if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) {
2504 readbytes += nfsd4_max_reply(argp->rqstp, op);
2506 max_reply += nfsd4_max_reply(argp->rqstp, op);
2508 * OP_LOCK and OP_LOCKT may return a conflicting lock.
2509 * (Special case because it will just skip encoding this
2510 * if it runs out of xdr buffer space, and it is the only
2511 * operation that behaves this way.)
2513 if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT)
2514 max_reply += NFS4_OPAQUE_LIMIT;
2521 /* Sessions make the DRC unnecessary: */
2522 if (argp->minorversion)
2524 svc_reserve(argp->rqstp, max_reply + readbytes);
2525 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
2527 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
2528 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags);
2533 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode,
2534 struct svc_export *exp)
2536 if (exp->ex_flags & NFSEXP_V4ROOT) {
2537 *p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time));
2540 p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode));
2545 * ctime (in NFSv4, time_metadata) is not writeable, and the client
2546 * doesn't really care what resolution could theoretically be stored by
2549 * The client cares how close together changes can be while still
2550 * guaranteeing ctime changes. For most filesystems (which have
2551 * timestamps with nanosecond fields) that is limited by the resolution
2552 * of the time returned from current_time() (which I'm assuming to be
2555 static __be32 *encode_time_delta(__be32 *p, struct inode *inode)
2557 struct timespec64 ts;
2560 ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran);
2561 ts = ns_to_timespec64(ns);
2563 p = xdr_encode_hyper(p, ts.tv_sec);
2564 *p++ = cpu_to_be32(ts.tv_nsec);
2569 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
2571 *p++ = cpu_to_be32(c->atomic);
2572 p = xdr_encode_hyper(p, c->before_change);
2573 p = xdr_encode_hyper(p, c->after_change);
2577 /* Encode as an array of strings the string given with components
2578 * separated @sep, escaped with esc_enter and esc_exit.
2580 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
2581 char *components, char esc_enter,
2587 int strlen, count=0;
2588 char *str, *end, *next;
2590 dprintk("nfsd4_encode_components(%s)\n", components);
2592 pathlen_offset = xdr->buf->len;
2593 p = xdr_reserve_space(xdr, 4);
2595 return nfserr_resource;
2596 p++; /* We will fill this in with @count later */
2598 end = str = components;
2600 bool found_esc = false;
2602 /* try to parse as esc_start, ..., esc_end, sep */
2603 if (*str == esc_enter) {
2604 for (; *end && (*end != esc_exit); end++)
2605 /* find esc_exit or end of string */;
2607 if (*end && (!*next || *next == sep)) {
2614 for (; *end && (*end != sep); end++)
2615 /* find sep or end of string */;
2619 p = xdr_reserve_space(xdr, strlen + 4);
2621 return nfserr_resource;
2622 p = xdr_encode_opaque(p, str, strlen);
2632 pathlen = htonl(count);
2633 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
2637 /* Encode as an array of strings the string given with components
2640 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
2643 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
2647 * encode a location element of a fs_locations structure
2649 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
2650 struct nfsd4_fs_location *location)
2654 status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
2658 status = nfsd4_encode_components(xdr, '/', location->path);
2665 * Encode a path in RFC3530 'pathname4' format
2667 static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
2668 const struct path *root,
2669 const struct path *path)
2671 struct path cur = *path;
2673 struct dentry **components = NULL;
2674 unsigned int ncomponents = 0;
2675 __be32 err = nfserr_jukebox;
2677 dprintk("nfsd4_encode_components(");
2680 /* First walk the path up to the nfsd root, and store the
2681 * dentries/path components in an array.
2684 if (path_equal(&cur, root))
2686 if (cur.dentry == cur.mnt->mnt_root) {
2687 if (follow_up(&cur))
2691 if ((ncomponents & 15) == 0) {
2692 struct dentry **new;
2693 new = krealloc(components,
2694 sizeof(*new) * (ncomponents + 16),
2700 components[ncomponents++] = cur.dentry;
2701 cur.dentry = dget_parent(cur.dentry);
2703 err = nfserr_resource;
2704 p = xdr_reserve_space(xdr, 4);
2707 *p++ = cpu_to_be32(ncomponents);
2709 while (ncomponents) {
2710 struct dentry *dentry = components[ncomponents - 1];
2713 spin_lock(&dentry->d_lock);
2714 len = dentry->d_name.len;
2715 p = xdr_reserve_space(xdr, len + 4);
2717 spin_unlock(&dentry->d_lock);
2720 p = xdr_encode_opaque(p, dentry->d_name.name, len);
2721 dprintk("/%pd", dentry);
2722 spin_unlock(&dentry->d_lock);
2731 dput(components[--ncomponents]);
2737 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
2738 struct svc_rqst *rqstp, const struct path *path)
2740 struct svc_export *exp_ps;
2743 exp_ps = rqst_find_fsidzero_export(rqstp);
2745 return nfserrno(PTR_ERR(exp_ps));
2746 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
2752 * encode a fs_locations structure
2754 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
2755 struct svc_rqst *rqstp, struct svc_export *exp)
2760 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
2762 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
2765 p = xdr_reserve_space(xdr, 4);
2767 return nfserr_resource;
2768 *p++ = cpu_to_be32(fslocs->locations_count);
2769 for (i=0; i<fslocs->locations_count; i++) {
2770 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
2777 static u32 nfs4_file_type(umode_t mode)
2779 switch (mode & S_IFMT) {
2780 case S_IFIFO: return NF4FIFO;
2781 case S_IFCHR: return NF4CHR;
2782 case S_IFDIR: return NF4DIR;
2783 case S_IFBLK: return NF4BLK;
2784 case S_IFLNK: return NF4LNK;
2785 case S_IFREG: return NF4REG;
2786 case S_IFSOCK: return NF4SOCK;
2787 default: return NF4BAD;
2791 static inline __be32
2792 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2793 struct nfs4_ace *ace)
2795 if (ace->whotype != NFS4_ACL_WHO_NAMED)
2796 return nfs4_acl_write_who(xdr, ace->whotype);
2797 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
2798 return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
2800 return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
2803 static inline __be32
2804 nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types)
2807 unsigned long i = hweight_long(layout_types);
2809 p = xdr_reserve_space(xdr, 4 + 4 * i);
2811 return nfserr_resource;
2813 *p++ = cpu_to_be32(i);
2815 for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i)
2816 if (layout_types & (1 << i))
2817 *p++ = cpu_to_be32(i);
2822 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
2823 FATTR4_WORD0_RDATTR_ERROR)
2824 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
2825 #define WORD2_ABSENT_FS_ATTRS 0
2827 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2828 static inline __be32
2829 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2830 void *context, int len)
2834 p = xdr_reserve_space(xdr, len + 4 + 4 + 4);
2836 return nfserr_resource;
2839 * For now we use a 0 here to indicate the null translation; in
2840 * the future we may place a call to translation code here.
2842 *p++ = cpu_to_be32(0); /* lfs */
2843 *p++ = cpu_to_be32(0); /* pi */
2844 p = xdr_encode_opaque(p, context, len);
2848 static inline __be32
2849 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2850 void *context, int len)
2854 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err)
2856 /* As per referral draft: */
2857 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
2858 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
2859 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
2860 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
2861 *rdattr_err = NFSERR_MOVED;
2863 return nfserr_moved;
2865 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
2866 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
2867 *bmval2 &= WORD2_ABSENT_FS_ATTRS;
2872 static int nfsd4_get_mounted_on_ino(struct svc_export *exp, u64 *pino)
2874 struct path path = exp->ex_path;
2879 while (follow_up(&path)) {
2880 if (path.dentry != path.mnt->mnt_root)
2883 err = vfs_getattr(&path, &stat, STATX_INO, AT_STATX_SYNC_AS_STAT);
2891 nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2)
2896 p = xdr_reserve_space(xdr, 16);
2899 *p++ = cpu_to_be32(3);
2900 *p++ = cpu_to_be32(bmval0);
2901 *p++ = cpu_to_be32(bmval1);
2902 *p++ = cpu_to_be32(bmval2);
2903 } else if (bmval1) {
2904 p = xdr_reserve_space(xdr, 12);
2907 *p++ = cpu_to_be32(2);
2908 *p++ = cpu_to_be32(bmval0);
2909 *p++ = cpu_to_be32(bmval1);
2911 p = xdr_reserve_space(xdr, 8);
2914 *p++ = cpu_to_be32(1);
2915 *p++ = cpu_to_be32(bmval0);
2920 return nfserr_resource;
2924 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2928 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2929 struct svc_export *exp,
2930 struct dentry *dentry, u32 *bmval,
2931 struct svc_rqst *rqstp, int ignore_crossmnt)
2933 u32 bmval0 = bmval[0];
2934 u32 bmval1 = bmval[1];
2935 u32 bmval2 = bmval[2];
2937 struct svc_fh *tempfh = NULL;
2938 struct kstatfs statfs;
2939 __be32 *p, *attrlen_p;
2940 int starting_len = xdr->buf->len;
2947 struct nfs4_acl *acl = NULL;
2948 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2949 void *context = NULL;
2952 bool contextsupport = false;
2953 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2954 u32 minorversion = resp->cstate.minorversion;
2955 struct path path = {
2956 .mnt = exp->ex_path.mnt,
2959 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2961 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2962 BUG_ON(!nfsd_attrs_supported(minorversion, bmval));
2964 if (exp->ex_fslocs.migrated) {
2965 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err);
2970 err = vfs_getattr(&path, &stat,
2971 STATX_BASIC_STATS | STATX_BTIME | STATX_CHANGE_COOKIE,
2972 AT_STATX_SYNC_AS_STAT);
2975 if (!(stat.result_mask & STATX_BTIME))
2976 /* underlying FS does not offer btime so we can't share it */
2977 bmval1 &= ~FATTR4_WORD1_TIME_CREATE;
2978 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2979 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
2980 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2981 FATTR4_WORD1_SPACE_TOTAL))) {
2982 err = vfs_statfs(&path, &statfs);
2986 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2987 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2988 status = nfserr_jukebox;
2991 fh_init(tempfh, NFS4_FHSIZE);
2992 status = fh_compose(tempfh, exp, dentry, NULL);
2997 if (bmval0 & FATTR4_WORD0_ACL) {
2998 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2999 if (err == -EOPNOTSUPP)
3000 bmval0 &= ~FATTR4_WORD0_ACL;
3001 else if (err == -EINVAL) {
3002 status = nfserr_attrnotsupp;
3004 } else if (err != 0)
3008 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3009 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) ||
3010 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
3011 if (exp->ex_flags & NFSEXP_SECURITY_LABEL)
3012 err = security_inode_getsecctx(d_inode(dentry),
3013 &context, &contextlen);
3016 contextsupport = (err == 0);
3017 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
3018 if (err == -EOPNOTSUPP)
3019 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
3024 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
3026 status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2);
3030 attrlen_offset = xdr->buf->len;
3031 attrlen_p = xdr_reserve_space(xdr, XDR_UNIT);
3035 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
3038 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
3040 if (!IS_POSIXACL(dentry->d_inode))
3041 supp[0] &= ~FATTR4_WORD0_ACL;
3042 if (!contextsupport)
3043 supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
3045 p = xdr_reserve_space(xdr, 12);
3048 *p++ = cpu_to_be32(2);
3049 *p++ = cpu_to_be32(supp[0]);
3050 *p++ = cpu_to_be32(supp[1]);
3052 p = xdr_reserve_space(xdr, 16);
3055 *p++ = cpu_to_be32(3);
3056 *p++ = cpu_to_be32(supp[0]);
3057 *p++ = cpu_to_be32(supp[1]);
3058 *p++ = cpu_to_be32(supp[2]);
3061 if (bmval0 & FATTR4_WORD0_TYPE) {
3062 p = xdr_reserve_space(xdr, 4);
3065 dummy = nfs4_file_type(stat.mode);
3066 if (dummy == NF4BAD) {
3067 status = nfserr_serverfault;
3070 *p++ = cpu_to_be32(dummy);
3072 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
3073 p = xdr_reserve_space(xdr, 4);
3076 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
3077 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
3079 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
3080 NFS4_FH_VOL_RENAME);
3082 if (bmval0 & FATTR4_WORD0_CHANGE) {
3083 p = xdr_reserve_space(xdr, 8);
3086 p = encode_change(p, &stat, d_inode(dentry), exp);
3088 if (bmval0 & FATTR4_WORD0_SIZE) {
3089 p = xdr_reserve_space(xdr, 8);
3092 p = xdr_encode_hyper(p, stat.size);
3094 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
3095 p = xdr_reserve_space(xdr, 4);
3098 *p++ = cpu_to_be32(1);
3100 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
3101 p = xdr_reserve_space(xdr, 4);
3104 *p++ = cpu_to_be32(1);
3106 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
3107 p = xdr_reserve_space(xdr, 4);
3110 *p++ = cpu_to_be32(0);
3112 if (bmval0 & FATTR4_WORD0_FSID) {
3113 p = xdr_reserve_space(xdr, 16);
3116 if (exp->ex_fslocs.migrated) {
3117 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
3118 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
3119 } else switch(fsid_source(fhp)) {
3120 case FSIDSOURCE_FSID:
3121 p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
3122 p = xdr_encode_hyper(p, (u64)0);
3124 case FSIDSOURCE_DEV:
3125 *p++ = cpu_to_be32(0);
3126 *p++ = cpu_to_be32(MAJOR(stat.dev));
3127 *p++ = cpu_to_be32(0);
3128 *p++ = cpu_to_be32(MINOR(stat.dev));
3130 case FSIDSOURCE_UUID:
3131 p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
3136 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
3137 p = xdr_reserve_space(xdr, 4);
3140 *p++ = cpu_to_be32(0);
3142 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
3143 p = xdr_reserve_space(xdr, 4);
3146 *p++ = cpu_to_be32(nn->nfsd4_lease);
3148 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
3149 p = xdr_reserve_space(xdr, 4);
3152 *p++ = cpu_to_be32(rdattr_err);
3154 if (bmval0 & FATTR4_WORD0_ACL) {
3155 struct nfs4_ace *ace;
3158 p = xdr_reserve_space(xdr, 4);
3162 *p++ = cpu_to_be32(0);
3165 p = xdr_reserve_space(xdr, 4);
3168 *p++ = cpu_to_be32(acl->naces);
3170 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
3171 p = xdr_reserve_space(xdr, 4*3);
3174 *p++ = cpu_to_be32(ace->type);
3175 *p++ = cpu_to_be32(ace->flag);
3176 *p++ = cpu_to_be32(ace->access_mask &
3178 status = nfsd4_encode_aclname(xdr, rqstp, ace);
3184 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
3185 p = xdr_reserve_space(xdr, 4);
3188 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ?
3189 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
3191 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
3192 p = xdr_reserve_space(xdr, 4);
3195 *p++ = cpu_to_be32(1);
3197 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
3198 p = xdr_reserve_space(xdr, 4);
3201 *p++ = cpu_to_be32(0);
3203 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
3204 p = xdr_reserve_space(xdr, 4);
3207 *p++ = cpu_to_be32(1);
3209 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
3210 p = xdr_reserve_space(xdr, 4);
3213 *p++ = cpu_to_be32(1);
3215 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
3216 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
3219 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw,
3220 fhp->fh_handle.fh_size);
3222 if (bmval0 & FATTR4_WORD0_FILEID) {
3223 p = xdr_reserve_space(xdr, 8);
3226 p = xdr_encode_hyper(p, stat.ino);
3228 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
3229 p = xdr_reserve_space(xdr, 8);
3232 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3234 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
3235 p = xdr_reserve_space(xdr, 8);
3238 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3240 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
3241 p = xdr_reserve_space(xdr, 8);
3244 p = xdr_encode_hyper(p, (u64) statfs.f_files);
3246 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
3247 status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
3251 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
3252 p = xdr_reserve_space(xdr, 4);
3255 *p++ = cpu_to_be32(1);
3257 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
3258 p = xdr_reserve_space(xdr, 8);
3261 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
3263 if (bmval0 & FATTR4_WORD0_MAXLINK) {
3264 p = xdr_reserve_space(xdr, 4);
3267 *p++ = cpu_to_be32(255);
3269 if (bmval0 & FATTR4_WORD0_MAXNAME) {
3270 p = xdr_reserve_space(xdr, 4);
3273 *p++ = cpu_to_be32(statfs.f_namelen);
3275 if (bmval0 & FATTR4_WORD0_MAXREAD) {
3276 p = xdr_reserve_space(xdr, 8);
3279 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3281 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
3282 p = xdr_reserve_space(xdr, 8);
3285 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3287 if (bmval1 & FATTR4_WORD1_MODE) {
3288 p = xdr_reserve_space(xdr, 4);
3291 *p++ = cpu_to_be32(stat.mode & S_IALLUGO);
3293 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
3294 p = xdr_reserve_space(xdr, 4);
3297 *p++ = cpu_to_be32(1);
3299 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
3300 p = xdr_reserve_space(xdr, 4);
3303 *p++ = cpu_to_be32(stat.nlink);
3305 if (bmval1 & FATTR4_WORD1_OWNER) {
3306 status = nfsd4_encode_user(xdr, rqstp, stat.uid);
3310 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
3311 status = nfsd4_encode_group(xdr, rqstp, stat.gid);
3315 if (bmval1 & FATTR4_WORD1_RAWDEV) {
3316 p = xdr_reserve_space(xdr, 8);
3319 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
3320 *p++ = cpu_to_be32((u32) MINOR(stat.rdev));
3322 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
3323 p = xdr_reserve_space(xdr, 8);
3326 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
3327 p = xdr_encode_hyper(p, dummy64);
3329 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
3330 p = xdr_reserve_space(xdr, 8);
3333 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
3334 p = xdr_encode_hyper(p, dummy64);
3336 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
3337 p = xdr_reserve_space(xdr, 8);
3340 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
3341 p = xdr_encode_hyper(p, dummy64);
3343 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
3344 p = xdr_reserve_space(xdr, 8);
3347 dummy64 = (u64)stat.blocks << 9;
3348 p = xdr_encode_hyper(p, dummy64);
3350 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
3351 p = xdr_reserve_space(xdr, 12);
3354 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
3355 *p++ = cpu_to_be32(stat.atime.tv_nsec);
3357 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
3358 p = xdr_reserve_space(xdr, 12);
3361 p = encode_time_delta(p, d_inode(dentry));
3363 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
3364 p = xdr_reserve_space(xdr, 12);
3367 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
3368 *p++ = cpu_to_be32(stat.ctime.tv_nsec);
3370 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
3371 p = xdr_reserve_space(xdr, 12);
3374 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
3375 *p++ = cpu_to_be32(stat.mtime.tv_nsec);
3377 if (bmval1 & FATTR4_WORD1_TIME_CREATE) {
3378 p = xdr_reserve_space(xdr, 12);
3381 p = xdr_encode_hyper(p, (s64)stat.btime.tv_sec);
3382 *p++ = cpu_to_be32(stat.btime.tv_nsec);
3384 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
3387 p = xdr_reserve_space(xdr, 8);
3391 * Get ino of mountpoint in parent filesystem, if not ignoring
3392 * crossmount and this is the root of a cross-mounted
3395 if (ignore_crossmnt == 0 &&
3396 dentry == exp->ex_path.mnt->mnt_root) {
3397 err = nfsd4_get_mounted_on_ino(exp, &ino);
3401 p = xdr_encode_hyper(p, ino);
3403 #ifdef CONFIG_NFSD_PNFS
3404 if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) {
3405 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3410 if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) {
3411 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3416 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) {
3417 p = xdr_reserve_space(xdr, 4);
3420 *p++ = cpu_to_be32(stat.blksize);
3422 #endif /* CONFIG_NFSD_PNFS */
3423 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
3426 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
3427 supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0;
3428 supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1;
3429 supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2;
3431 status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]);
3436 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3437 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
3438 status = nfsd4_encode_security_label(xdr, rqstp, context,
3445 if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) {
3446 p = xdr_reserve_space(xdr, 4);
3449 err = xattr_supports_user_prefix(d_inode(dentry));
3450 *p++ = cpu_to_be32(err == 0);
3453 *attrlen_p = cpu_to_be32(xdr->buf->len - attrlen_offset - XDR_UNIT);
3457 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3459 security_release_secctx(context, contextlen);
3460 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
3467 xdr_truncate_encode(xdr, starting_len);
3470 status = nfserrno(err);
3473 status = nfserr_resource;
3477 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
3478 struct xdr_buf *buf, __be32 *p, int bytes)
3480 xdr->scratch.iov_len = 0;
3481 memset(buf, 0, sizeof(struct xdr_buf));
3482 buf->head[0].iov_base = p;
3483 buf->head[0].iov_len = 0;
3486 xdr->iov = buf->head;
3488 xdr->end = (void *)p + bytes;
3489 buf->buflen = bytes;
3492 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
3493 struct svc_fh *fhp, struct svc_export *exp,
3494 struct dentry *dentry, u32 *bmval,
3495 struct svc_rqst *rqstp, int ignore_crossmnt)
3497 struct xdr_buf dummy;
3498 struct xdr_stream xdr;
3501 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
3502 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
3508 static inline int attributes_need_mount(u32 *bmval)
3510 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
3512 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
3518 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
3519 const char *name, int namlen)
3521 struct svc_export *exp = cd->rd_fhp->fh_export;
3522 struct dentry *dentry;
3524 int ignore_crossmnt = 0;
3526 dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen);
3528 return nfserrno(PTR_ERR(dentry));
3532 * In the case of a mountpoint, the client may be asking for
3533 * attributes that are only properties of the underlying filesystem
3534 * as opposed to the cross-mounted file system. In such a case,
3535 * we will not follow the cross mount and will fill the attribtutes
3536 * directly from the mountpoint dentry.
3538 if (nfsd_mountpoint(dentry, exp)) {
3541 if (!(exp->ex_flags & NFSEXP_V4ROOT)
3542 && !attributes_need_mount(cd->rd_bmval)) {
3543 ignore_crossmnt = 1;
3547 * Why the heck aren't we just using nfsd_lookup??
3548 * Different "."/".." handling? Something else?
3549 * At least, add a comment here to explain....
3551 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
3553 nfserr = nfserrno(err);
3556 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
3562 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
3563 cd->rd_rqstp, ignore_crossmnt);
3571 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
3575 p = xdr_reserve_space(xdr, 20);
3579 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
3580 *p++ = htonl(0); /* bmval1 */
3582 *p++ = htonl(4); /* attribute length */
3583 *p++ = nfserr; /* no htonl */
3588 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
3589 loff_t offset, u64 ino, unsigned int d_type)
3591 struct readdir_cd *ccd = ccdv;
3592 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
3593 struct xdr_stream *xdr = cd->xdr;
3594 int start_offset = xdr->buf->len;
3596 u32 name_and_cookie;
3598 __be32 nfserr = nfserr_toosmall;
3602 /* In nfsv4, "." and ".." never make it onto the wire.. */
3603 if (name && isdotent(name, namlen)) {
3604 cd->common.err = nfs_ok;
3608 if (cd->cookie_offset) {
3609 wire_offset = cpu_to_be64(offset);
3610 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
3614 p = xdr_reserve_space(xdr, 4);
3617 *p++ = xdr_one; /* mark entry present */
3618 cookie_offset = xdr->buf->len;
3619 p = xdr_reserve_space(xdr, 3*4 + namlen);
3622 p = xdr_encode_hyper(p, OFFSET_MAX); /* offset of next entry */
3623 p = xdr_encode_array(p, name, namlen); /* name length & name */
3625 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
3629 case nfserr_resource:
3630 nfserr = nfserr_toosmall;
3633 xdr_truncate_encode(xdr, start_offset);
3635 case nfserr_jukebox:
3637 * The pseudoroot should only display dentries that lead to
3638 * exports. If we get EJUKEBOX here, then we can't tell whether
3639 * this entry should be included. Just fail the whole READDIR
3640 * with NFS4ERR_DELAY in that case, and hope that the situation
3641 * will resolve itself by the client's next attempt.
3643 if (cd->rd_fhp->fh_export->ex_flags & NFSEXP_V4ROOT)
3648 * If the client requested the RDATTR_ERROR attribute,
3649 * we stuff the error code into this attribute
3650 * and continue. If this attribute was not requested,
3651 * then in accordance with the spec, we fail the
3652 * entire READDIR operation(!)
3654 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
3656 p = nfsd4_encode_rdattr_error(xdr, nfserr);
3658 nfserr = nfserr_toosmall;
3662 nfserr = nfserr_toosmall;
3663 entry_bytes = xdr->buf->len - start_offset;
3664 if (entry_bytes > cd->rd_maxcount)
3666 cd->rd_maxcount -= entry_bytes;
3668 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and
3669 * notes that it could be zero. If it is zero, then the server
3670 * should enforce only the rd_maxcount value.
3672 if (cd->rd_dircount) {
3673 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
3674 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
3676 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
3677 if (!cd->rd_dircount)
3678 cd->rd_maxcount = 0;
3681 cd->cookie_offset = cookie_offset;
3683 cd->common.err = nfs_ok;
3686 xdr_truncate_encode(xdr, start_offset);
3687 cd->common.err = nfserr;
3692 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
3696 p = xdr_reserve_space(xdr, sizeof(stateid_t));
3698 return nfserr_resource;
3699 *p++ = cpu_to_be32(sid->si_generation);
3700 p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
3701 sizeof(stateid_opaque_t));
3706 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr,
3707 union nfsd4_op_u *u)
3709 struct nfsd4_access *access = &u->access;
3710 struct xdr_stream *xdr = resp->xdr;
3713 p = xdr_reserve_space(xdr, 8);
3715 return nfserr_resource;
3716 *p++ = cpu_to_be32(access->ac_supported);
3717 *p++ = cpu_to_be32(access->ac_resp_access);
3721 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr,
3722 union nfsd4_op_u *u)
3724 struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session;
3725 struct xdr_stream *xdr = resp->xdr;
3728 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
3730 return nfserr_resource;
3731 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
3732 NFS4_MAX_SESSIONID_LEN);
3733 *p++ = cpu_to_be32(bcts->dir);
3734 /* Upshifting from TCP to RDMA is not supported */
3735 *p++ = cpu_to_be32(0);
3740 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr,
3741 union nfsd4_op_u *u)
3743 struct nfsd4_close *close = &u->close;
3744 struct xdr_stream *xdr = resp->xdr;
3746 return nfsd4_encode_stateid(xdr, &close->cl_stateid);
3751 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr,
3752 union nfsd4_op_u *u)
3754 struct nfsd4_commit *commit = &u->commit;
3755 struct xdr_stream *xdr = resp->xdr;
3758 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3760 return nfserr_resource;
3761 p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
3762 NFS4_VERIFIER_SIZE);
3767 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr,
3768 union nfsd4_op_u *u)
3770 struct nfsd4_create *create = &u->create;
3771 struct xdr_stream *xdr = resp->xdr;
3774 p = xdr_reserve_space(xdr, 20);
3776 return nfserr_resource;
3777 encode_cinfo(p, &create->cr_cinfo);
3778 return nfsd4_encode_bitmap(xdr, create->cr_bmval[0],
3779 create->cr_bmval[1], create->cr_bmval[2]);
3783 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr,
3784 union nfsd4_op_u *u)
3786 struct nfsd4_getattr *getattr = &u->getattr;
3787 struct svc_fh *fhp = getattr->ga_fhp;
3788 struct xdr_stream *xdr = resp->xdr;
3790 return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
3791 getattr->ga_bmval, resp->rqstp, 0);
3795 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr,
3796 union nfsd4_op_u *u)
3798 struct svc_fh **fhpp = &u->getfh;
3799 struct xdr_stream *xdr = resp->xdr;
3800 struct svc_fh *fhp = *fhpp;
3804 len = fhp->fh_handle.fh_size;
3805 p = xdr_reserve_space(xdr, len + 4);
3807 return nfserr_resource;
3808 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, len);
3813 * Including all fields other than the name, a LOCK4denied structure requires
3814 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
3817 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
3819 struct xdr_netobj *conf = &ld->ld_owner;
3823 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
3826 * Don't fail to return the result just because we can't
3827 * return the conflicting open:
3835 return nfserr_resource;
3837 p = xdr_encode_hyper(p, ld->ld_start);
3838 p = xdr_encode_hyper(p, ld->ld_length);
3839 *p++ = cpu_to_be32(ld->ld_type);
3841 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
3842 p = xdr_encode_opaque(p, conf->data, conf->len);
3844 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
3845 p = xdr_encode_hyper(p, (u64)0); /* clientid */
3846 *p++ = cpu_to_be32(0); /* length of owner name */
3848 return nfserr_denied;
3852 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr,
3853 union nfsd4_op_u *u)
3855 struct nfsd4_lock *lock = &u->lock;
3856 struct xdr_stream *xdr = resp->xdr;
3859 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
3860 else if (nfserr == nfserr_denied)
3861 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
3867 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr,
3868 union nfsd4_op_u *u)
3870 struct nfsd4_lockt *lockt = &u->lockt;
3871 struct xdr_stream *xdr = resp->xdr;
3873 if (nfserr == nfserr_denied)
3874 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
3879 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr,
3880 union nfsd4_op_u *u)
3882 struct nfsd4_locku *locku = &u->locku;
3883 struct xdr_stream *xdr = resp->xdr;
3885 return nfsd4_encode_stateid(xdr, &locku->lu_stateid);
3890 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr,
3891 union nfsd4_op_u *u)
3893 struct nfsd4_link *link = &u->link;
3894 struct xdr_stream *xdr = resp->xdr;
3897 p = xdr_reserve_space(xdr, 20);
3899 return nfserr_resource;
3900 p = encode_cinfo(p, &link->li_cinfo);
3906 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr,
3907 union nfsd4_op_u *u)
3909 struct nfsd4_open *open = &u->open;
3910 struct xdr_stream *xdr = resp->xdr;
3913 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
3916 p = xdr_reserve_space(xdr, 24);
3918 return nfserr_resource;
3919 p = encode_cinfo(p, &open->op_cinfo);
3920 *p++ = cpu_to_be32(open->op_rflags);
3922 nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1],
3927 p = xdr_reserve_space(xdr, 4);
3929 return nfserr_resource;
3931 *p++ = cpu_to_be32(open->op_delegate_type);
3932 switch (open->op_delegate_type) {
3933 case NFS4_OPEN_DELEGATE_NONE:
3935 case NFS4_OPEN_DELEGATE_READ:
3936 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3939 p = xdr_reserve_space(xdr, 20);
3941 return nfserr_resource;
3942 *p++ = cpu_to_be32(open->op_recall);
3945 * TODO: ACE's in delegations
3947 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3948 *p++ = cpu_to_be32(0);
3949 *p++ = cpu_to_be32(0);
3950 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3952 case NFS4_OPEN_DELEGATE_WRITE:
3953 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3956 p = xdr_reserve_space(xdr, 32);
3958 return nfserr_resource;
3959 *p++ = cpu_to_be32(0);
3962 * TODO: space_limit's in delegations
3964 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
3965 *p++ = cpu_to_be32(~(u32)0);
3966 *p++ = cpu_to_be32(~(u32)0);
3969 * TODO: ACE's in delegations
3971 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3972 *p++ = cpu_to_be32(0);
3973 *p++ = cpu_to_be32(0);
3974 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3976 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3977 switch (open->op_why_no_deleg) {
3978 case WND4_CONTENTION:
3980 p = xdr_reserve_space(xdr, 8);
3982 return nfserr_resource;
3983 *p++ = cpu_to_be32(open->op_why_no_deleg);
3984 /* deleg signaling not supported yet: */
3985 *p++ = cpu_to_be32(0);
3988 p = xdr_reserve_space(xdr, 4);
3990 return nfserr_resource;
3991 *p++ = cpu_to_be32(open->op_why_no_deleg);
3997 /* XXX save filehandle here */
4002 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr,
4003 union nfsd4_op_u *u)
4005 struct nfsd4_open_confirm *oc = &u->open_confirm;
4006 struct xdr_stream *xdr = resp->xdr;
4008 return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
4012 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr,
4013 union nfsd4_op_u *u)
4015 struct nfsd4_open_downgrade *od = &u->open_downgrade;
4016 struct xdr_stream *xdr = resp->xdr;
4018 return nfsd4_encode_stateid(xdr, &od->od_stateid);
4021 static __be32 nfsd4_encode_splice_read(
4022 struct nfsd4_compoundres *resp,
4023 struct nfsd4_read *read,
4024 struct file *file, unsigned long maxcount)
4026 struct xdr_stream *xdr = resp->xdr;
4027 struct xdr_buf *buf = xdr->buf;
4028 int status, space_left;
4031 /* Make sure there will be room for padding if needed */
4032 if (xdr->end - xdr->p < 1)
4033 return nfserr_resource;
4035 nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp,
4036 file, read->rd_offset, &maxcount,
4038 read->rd_length = maxcount;
4041 status = svc_encode_result_payload(read->rd_rqstp,
4042 buf->head[0].iov_len, maxcount);
4044 nfserr = nfserrno(status);
4048 buf->page_len = maxcount;
4049 buf->len += maxcount;
4050 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1)
4053 /* Use rest of head for padding and remaining ops: */
4054 buf->tail[0].iov_base = xdr->p;
4055 buf->tail[0].iov_len = 0;
4056 xdr->iov = buf->tail;
4058 int pad = 4 - (maxcount&3);
4062 buf->tail[0].iov_base += maxcount&3;
4063 buf->tail[0].iov_len = pad;
4067 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
4068 buf->buflen - buf->len);
4069 buf->buflen = buf->len + space_left;
4070 xdr->end = (__be32 *)((void *)xdr->end + space_left);
4076 * nfsd_splice_actor may have already messed with the
4077 * page length; reset it so as not to confuse
4078 * xdr_truncate_encode in our caller.
4084 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
4085 struct nfsd4_read *read,
4086 struct file *file, unsigned long maxcount)
4088 struct xdr_stream *xdr = resp->xdr;
4089 unsigned int starting_len = xdr->buf->len;
4090 __be32 zero = xdr_zero;
4093 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, maxcount);
4094 if (read->rd_vlen < 0)
4095 return nfserr_resource;
4097 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset,
4098 resp->rqstp->rq_vec, read->rd_vlen, &maxcount,
4100 read->rd_length = maxcount;
4103 if (svc_encode_result_payload(resp->rqstp, starting_len, maxcount))
4105 xdr_truncate_encode(xdr, starting_len + xdr_align_size(maxcount));
4107 write_bytes_to_xdr_buf(xdr->buf, starting_len + maxcount, &zero,
4108 xdr_pad_size(maxcount));
4113 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
4114 union nfsd4_op_u *u)
4116 struct nfsd4_read *read = &u->read;
4117 bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags);
4118 unsigned long maxcount;
4119 struct xdr_stream *xdr = resp->xdr;
4121 int starting_len = xdr->buf->len;
4126 file = read->rd_nf->nf_file;
4128 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
4130 WARN_ON_ONCE(splice_ok);
4131 return nfserr_resource;
4133 if (resp->xdr->buf->page_len && splice_ok) {
4135 return nfserr_serverfault;
4137 xdr_commit_encode(xdr);
4139 maxcount = min_t(unsigned long, read->rd_length,
4140 (xdr->buf->buflen - xdr->buf->len));
4142 if (file->f_op->splice_read && splice_ok)
4143 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
4145 nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
4147 xdr_truncate_encode(xdr, starting_len);
4151 p = xdr_encode_bool(p, read->rd_eof);
4152 *p = cpu_to_be32(read->rd_length);
4157 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr,
4158 union nfsd4_op_u *u)
4160 struct nfsd4_readlink *readlink = &u->readlink;
4161 __be32 *p, *maxcount_p, zero = xdr_zero;
4162 struct xdr_stream *xdr = resp->xdr;
4163 int length_offset = xdr->buf->len;
4164 int maxcount, status;
4166 maxcount_p = xdr_reserve_space(xdr, XDR_UNIT);
4168 return nfserr_resource;
4169 maxcount = PAGE_SIZE;
4171 p = xdr_reserve_space(xdr, maxcount);
4173 return nfserr_resource;
4175 * XXX: By default, vfs_readlink() will truncate symlinks if they
4176 * would overflow the buffer. Is this kosher in NFSv4? If not, one
4177 * easy fix is: if vfs_readlink() precisely fills the buffer, assume
4178 * that truncation occurred, and return NFS4ERR_RESOURCE.
4180 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
4181 (char *)p, &maxcount);
4182 if (nfserr == nfserr_isdir)
4183 nfserr = nfserr_inval;
4186 status = svc_encode_result_payload(readlink->rl_rqstp, length_offset,
4189 nfserr = nfserrno(status);
4192 *maxcount_p = cpu_to_be32(maxcount);
4193 xdr_truncate_encode(xdr, length_offset + 4 + xdr_align_size(maxcount));
4194 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, &zero,
4195 xdr_pad_size(maxcount));
4199 xdr_truncate_encode(xdr, length_offset);
4204 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr,
4205 union nfsd4_op_u *u)
4207 struct nfsd4_readdir *readdir = &u->readdir;
4212 struct xdr_stream *xdr = resp->xdr;
4213 int starting_len = xdr->buf->len;
4216 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
4218 return nfserr_resource;
4220 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
4221 *p++ = cpu_to_be32(0);
4222 *p++ = cpu_to_be32(0);
4223 xdr->buf->head[0].iov_len = (char *)xdr->p -
4224 (char *)xdr->buf->head[0].iov_base;
4227 * Number of bytes left for directory entries allowing for the
4228 * final 8 bytes of the readdir and a following failed op:
4230 bytes_left = xdr->buf->buflen - xdr->buf->len
4231 - COMPOUND_ERR_SLACK_SPACE - 8;
4232 if (bytes_left < 0) {
4233 nfserr = nfserr_resource;
4236 maxcount = svc_max_payload(resp->rqstp);
4237 maxcount = min_t(u32, readdir->rd_maxcount, maxcount);
4239 * Note the rfc defines rd_maxcount as the size of the
4240 * READDIR4resok structure, which includes the verifier above
4241 * and the 8 bytes encoded at the end of this function:
4243 if (maxcount < 16) {
4244 nfserr = nfserr_toosmall;
4247 maxcount = min_t(int, maxcount-16, bytes_left);
4249 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */
4250 if (!readdir->rd_dircount)
4251 readdir->rd_dircount = svc_max_payload(resp->rqstp);
4254 readdir->rd_maxcount = maxcount;
4255 readdir->common.err = 0;
4256 readdir->cookie_offset = 0;
4258 offset = readdir->rd_cookie;
4259 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
4261 &readdir->common, nfsd4_encode_dirent);
4262 if (nfserr == nfs_ok &&
4263 readdir->common.err == nfserr_toosmall &&
4264 xdr->buf->len == starting_len + 8) {
4265 /* nothing encoded; which limit did we hit?: */
4266 if (maxcount - 16 < bytes_left)
4267 /* It was the fault of rd_maxcount: */
4268 nfserr = nfserr_toosmall;
4270 /* We ran out of buffer space: */
4271 nfserr = nfserr_resource;
4276 if (readdir->cookie_offset) {
4277 wire_offset = cpu_to_be64(offset);
4278 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
4282 p = xdr_reserve_space(xdr, 8);
4287 *p++ = 0; /* no more entries */
4288 *p++ = htonl(readdir->common.err == nfserr_eof);
4292 xdr_truncate_encode(xdr, starting_len);
4297 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr,
4298 union nfsd4_op_u *u)
4300 struct nfsd4_remove *remove = &u->remove;
4301 struct xdr_stream *xdr = resp->xdr;
4304 p = xdr_reserve_space(xdr, 20);
4306 return nfserr_resource;
4307 p = encode_cinfo(p, &remove->rm_cinfo);
4312 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr,
4313 union nfsd4_op_u *u)
4315 struct nfsd4_rename *rename = &u->rename;
4316 struct xdr_stream *xdr = resp->xdr;
4319 p = xdr_reserve_space(xdr, 40);
4321 return nfserr_resource;
4322 p = encode_cinfo(p, &rename->rn_sinfo);
4323 p = encode_cinfo(p, &rename->rn_tinfo);
4328 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp)
4330 u32 i, nflavs, supported;
4331 struct exp_flavor_info *flavs;
4332 struct exp_flavor_info def_flavs[2];
4333 __be32 *p, *flavorsp;
4334 static bool report = true;
4336 if (exp->ex_nflavors) {
4337 flavs = exp->ex_flavors;
4338 nflavs = exp->ex_nflavors;
4339 } else { /* Handling of some defaults in absence of real secinfo: */
4341 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
4343 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
4344 flavs[1].pseudoflavor = RPC_AUTH_NULL;
4345 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
4347 flavs[0].pseudoflavor
4348 = svcauth_gss_flavor(exp->ex_client);
4351 flavs[0].pseudoflavor
4352 = exp->ex_client->flavour->flavour;
4357 p = xdr_reserve_space(xdr, 4);
4359 return nfserr_resource;
4360 flavorsp = p++; /* to be backfilled later */
4362 for (i = 0; i < nflavs; i++) {
4363 rpc_authflavor_t pf = flavs[i].pseudoflavor;
4364 struct rpcsec_gss_info info;
4366 if (rpcauth_get_gssinfo(pf, &info) == 0) {
4368 p = xdr_reserve_space(xdr, 4 + 4 +
4369 XDR_LEN(info.oid.len) + 4 + 4);
4371 return nfserr_resource;
4372 *p++ = cpu_to_be32(RPC_AUTH_GSS);
4373 p = xdr_encode_opaque(p, info.oid.data, info.oid.len);
4374 *p++ = cpu_to_be32(info.qop);
4375 *p++ = cpu_to_be32(info.service);
4376 } else if (pf < RPC_AUTH_MAXFLAVOR) {
4378 p = xdr_reserve_space(xdr, 4);
4380 return nfserr_resource;
4381 *p++ = cpu_to_be32(pf);
4384 pr_warn("NFS: SECINFO: security flavor %u "
4385 "is not supported\n", pf);
4389 if (nflavs != supported)
4391 *flavorsp = htonl(supported);
4396 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4397 union nfsd4_op_u *u)
4399 struct nfsd4_secinfo *secinfo = &u->secinfo;
4400 struct xdr_stream *xdr = resp->xdr;
4402 return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp);
4406 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
4407 union nfsd4_op_u *u)
4409 struct nfsd4_secinfo_no_name *secinfo = &u->secinfo_no_name;
4410 struct xdr_stream *xdr = resp->xdr;
4412 return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp);
4416 * The SETATTR encode routine is special -- it always encodes a bitmap,
4417 * regardless of the error status.
4420 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr,
4421 union nfsd4_op_u *u)
4423 struct nfsd4_setattr *setattr = &u->setattr;
4424 struct xdr_stream *xdr = resp->xdr;
4427 p = xdr_reserve_space(xdr, 16);
4429 return nfserr_resource;
4431 *p++ = cpu_to_be32(3);
4432 *p++ = cpu_to_be32(0);
4433 *p++ = cpu_to_be32(0);
4434 *p++ = cpu_to_be32(0);
4437 *p++ = cpu_to_be32(3);
4438 *p++ = cpu_to_be32(setattr->sa_bmval[0]);
4439 *p++ = cpu_to_be32(setattr->sa_bmval[1]);
4440 *p++ = cpu_to_be32(setattr->sa_bmval[2]);
4446 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr,
4447 union nfsd4_op_u *u)
4449 struct nfsd4_setclientid *scd = &u->setclientid;
4450 struct xdr_stream *xdr = resp->xdr;
4454 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
4456 return nfserr_resource;
4457 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
4458 p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
4459 NFS4_VERIFIER_SIZE);
4461 else if (nfserr == nfserr_clid_inuse) {
4462 p = xdr_reserve_space(xdr, 8);
4464 return nfserr_resource;
4465 *p++ = cpu_to_be32(0);
4466 *p++ = cpu_to_be32(0);
4472 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr,
4473 union nfsd4_op_u *u)
4475 struct nfsd4_write *write = &u->write;
4476 struct xdr_stream *xdr = resp->xdr;
4479 p = xdr_reserve_space(xdr, 16);
4481 return nfserr_resource;
4482 *p++ = cpu_to_be32(write->wr_bytes_written);
4483 *p++ = cpu_to_be32(write->wr_how_written);
4484 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4485 NFS4_VERIFIER_SIZE);
4490 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
4491 union nfsd4_op_u *u)
4493 struct nfsd4_exchange_id *exid = &u->exchange_id;
4494 struct xdr_stream *xdr = resp->xdr;
4499 int server_scope_sz;
4500 uint64_t minor_id = 0;
4501 struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id);
4503 major_id = nn->nfsd_name;
4504 major_id_sz = strlen(nn->nfsd_name);
4505 server_scope = nn->nfsd_name;
4506 server_scope_sz = strlen(nn->nfsd_name);
4508 p = xdr_reserve_space(xdr,
4509 8 /* eir_clientid */ +
4510 4 /* eir_sequenceid */ +
4514 return nfserr_resource;
4516 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
4517 *p++ = cpu_to_be32(exid->seqid);
4518 *p++ = cpu_to_be32(exid->flags);
4520 *p++ = cpu_to_be32(exid->spa_how);
4522 switch (exid->spa_how) {
4526 /* spo_must_enforce bitmap: */
4527 nfserr = nfsd4_encode_bitmap(xdr,
4528 exid->spo_must_enforce[0],
4529 exid->spo_must_enforce[1],
4530 exid->spo_must_enforce[2]);
4533 /* spo_must_allow bitmap: */
4534 nfserr = nfsd4_encode_bitmap(xdr,
4535 exid->spo_must_allow[0],
4536 exid->spo_must_allow[1],
4537 exid->spo_must_allow[2]);
4545 p = xdr_reserve_space(xdr,
4546 8 /* so_minor_id */ +
4547 4 /* so_major_id.len */ +
4548 (XDR_QUADLEN(major_id_sz) * 4) +
4549 4 /* eir_server_scope.len */ +
4550 (XDR_QUADLEN(server_scope_sz) * 4) +
4551 4 /* eir_server_impl_id.count (0) */);
4553 return nfserr_resource;
4555 /* The server_owner struct */
4556 p = xdr_encode_hyper(p, minor_id); /* Minor id */
4558 p = xdr_encode_opaque(p, major_id, major_id_sz);
4561 p = xdr_encode_opaque(p, server_scope, server_scope_sz);
4563 /* Implementation id */
4564 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
4569 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
4570 union nfsd4_op_u *u)
4572 struct nfsd4_create_session *sess = &u->create_session;
4573 struct xdr_stream *xdr = resp->xdr;
4576 p = xdr_reserve_space(xdr, 24);
4578 return nfserr_resource;
4579 p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
4580 NFS4_MAX_SESSIONID_LEN);
4581 *p++ = cpu_to_be32(sess->seqid);
4582 *p++ = cpu_to_be32(sess->flags);
4584 p = xdr_reserve_space(xdr, 28);
4586 return nfserr_resource;
4587 *p++ = cpu_to_be32(0); /* headerpadsz */
4588 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
4589 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
4590 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
4591 *p++ = cpu_to_be32(sess->fore_channel.maxops);
4592 *p++ = cpu_to_be32(sess->fore_channel.maxreqs);
4593 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
4595 if (sess->fore_channel.nr_rdma_attrs) {
4596 p = xdr_reserve_space(xdr, 4);
4598 return nfserr_resource;
4599 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
4602 p = xdr_reserve_space(xdr, 28);
4604 return nfserr_resource;
4605 *p++ = cpu_to_be32(0); /* headerpadsz */
4606 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
4607 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
4608 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
4609 *p++ = cpu_to_be32(sess->back_channel.maxops);
4610 *p++ = cpu_to_be32(sess->back_channel.maxreqs);
4611 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
4613 if (sess->back_channel.nr_rdma_attrs) {
4614 p = xdr_reserve_space(xdr, 4);
4616 return nfserr_resource;
4617 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
4623 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
4624 union nfsd4_op_u *u)
4626 struct nfsd4_sequence *seq = &u->sequence;
4627 struct xdr_stream *xdr = resp->xdr;
4630 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
4632 return nfserr_resource;
4633 p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
4634 NFS4_MAX_SESSIONID_LEN);
4635 *p++ = cpu_to_be32(seq->seqid);
4636 *p++ = cpu_to_be32(seq->slotid);
4637 /* Note slotid's are numbered from zero: */
4638 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
4639 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
4640 *p++ = cpu_to_be32(seq->status_flags);
4642 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
4647 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
4648 union nfsd4_op_u *u)
4650 struct nfsd4_test_stateid *test_stateid = &u->test_stateid;
4651 struct xdr_stream *xdr = resp->xdr;
4652 struct nfsd4_test_stateid_id *stateid, *next;
4655 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
4657 return nfserr_resource;
4658 *p++ = htonl(test_stateid->ts_num_ids);
4660 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
4661 *p++ = stateid->ts_id_status;
4667 #ifdef CONFIG_NFSD_PNFS
4669 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4670 union nfsd4_op_u *u)
4672 struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo;
4673 struct xdr_stream *xdr = resp->xdr;
4674 const struct nfsd4_layout_ops *ops;
4675 u32 starting_len = xdr->buf->len, needed_len;
4678 p = xdr_reserve_space(xdr, 4);
4680 return nfserr_resource;
4682 *p++ = cpu_to_be32(gdev->gd_layout_type);
4684 /* If maxcount is 0 then just update notifications */
4685 if (gdev->gd_maxcount != 0) {
4686 ops = nfsd4_layout_ops[gdev->gd_layout_type];
4687 nfserr = ops->encode_getdeviceinfo(xdr, gdev);
4690 * We don't bother to burden the layout drivers with
4691 * enforcing gd_maxcount, just tell the client to
4692 * come back with a bigger buffer if it's not enough.
4694 if (xdr->buf->len + 4 > gdev->gd_maxcount)
4700 if (gdev->gd_notify_types) {
4701 p = xdr_reserve_space(xdr, 4 + 4);
4703 return nfserr_resource;
4704 *p++ = cpu_to_be32(1); /* bitmap length */
4705 *p++ = cpu_to_be32(gdev->gd_notify_types);
4707 p = xdr_reserve_space(xdr, 4);
4709 return nfserr_resource;
4715 dprintk("%s: maxcount too small\n", __func__);
4716 needed_len = xdr->buf->len + 4 /* notifications */;
4717 xdr_truncate_encode(xdr, starting_len);
4718 p = xdr_reserve_space(xdr, 4);
4720 return nfserr_resource;
4721 *p++ = cpu_to_be32(needed_len);
4722 return nfserr_toosmall;
4726 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr,
4727 union nfsd4_op_u *u)
4729 struct nfsd4_layoutget *lgp = &u->layoutget;
4730 struct xdr_stream *xdr = resp->xdr;
4731 const struct nfsd4_layout_ops *ops;
4734 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t));
4736 return nfserr_resource;
4738 *p++ = cpu_to_be32(1); /* we always set return-on-close */
4739 *p++ = cpu_to_be32(lgp->lg_sid.si_generation);
4740 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque,
4741 sizeof(stateid_opaque_t));
4743 *p++ = cpu_to_be32(1); /* we always return a single layout */
4744 p = xdr_encode_hyper(p, lgp->lg_seg.offset);
4745 p = xdr_encode_hyper(p, lgp->lg_seg.length);
4746 *p++ = cpu_to_be32(lgp->lg_seg.iomode);
4747 *p++ = cpu_to_be32(lgp->lg_layout_type);
4749 ops = nfsd4_layout_ops[lgp->lg_layout_type];
4750 return ops->encode_layoutget(xdr, lgp);
4754 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr,
4755 union nfsd4_op_u *u)
4757 struct nfsd4_layoutcommit *lcp = &u->layoutcommit;
4758 struct xdr_stream *xdr = resp->xdr;
4761 p = xdr_reserve_space(xdr, 4);
4763 return nfserr_resource;
4764 *p++ = cpu_to_be32(lcp->lc_size_chg);
4765 if (lcp->lc_size_chg) {
4766 p = xdr_reserve_space(xdr, 8);
4768 return nfserr_resource;
4769 p = xdr_encode_hyper(p, lcp->lc_newsize);
4776 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr,
4777 union nfsd4_op_u *u)
4779 struct nfsd4_layoutreturn *lrp = &u->layoutreturn;
4780 struct xdr_stream *xdr = resp->xdr;
4783 p = xdr_reserve_space(xdr, 4);
4785 return nfserr_resource;
4786 *p++ = cpu_to_be32(lrp->lrs_present);
4787 if (lrp->lrs_present)
4788 return nfsd4_encode_stateid(xdr, &lrp->lr_sid);
4791 #endif /* CONFIG_NFSD_PNFS */
4794 nfsd42_encode_write_res(struct nfsd4_compoundres *resp,
4795 struct nfsd42_write_res *write, bool sync)
4798 p = xdr_reserve_space(resp->xdr, 4);
4800 return nfserr_resource;
4803 *p++ = cpu_to_be32(0);
4806 *p++ = cpu_to_be32(1);
4807 nfserr = nfsd4_encode_stateid(resp->xdr, &write->cb_stateid);
4811 p = xdr_reserve_space(resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE);
4813 return nfserr_resource;
4815 p = xdr_encode_hyper(p, write->wr_bytes_written);
4816 *p++ = cpu_to_be32(write->wr_stable_how);
4817 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4818 NFS4_VERIFIER_SIZE);
4823 nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns)
4825 struct xdr_stream *xdr = resp->xdr;
4826 struct nfs42_netaddr *addr;
4829 p = xdr_reserve_space(xdr, 4);
4830 *p++ = cpu_to_be32(ns->nl4_type);
4832 switch (ns->nl4_type) {
4834 addr = &ns->u.nl4_addr;
4836 /* netid_len, netid, uaddr_len, uaddr (port included
4837 * in RPCBIND_MAXUADDRLEN)
4839 p = xdr_reserve_space(xdr,
4841 (XDR_QUADLEN(addr->netid_len) * 4) +
4843 (XDR_QUADLEN(addr->addr_len) * 4));
4845 return nfserr_resource;
4847 *p++ = cpu_to_be32(addr->netid_len);
4848 p = xdr_encode_opaque_fixed(p, addr->netid,
4850 *p++ = cpu_to_be32(addr->addr_len);
4851 p = xdr_encode_opaque_fixed(p, addr->addr,
4855 WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR);
4856 return nfserr_inval;
4863 nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr,
4864 union nfsd4_op_u *u)
4866 struct nfsd4_copy *copy = &u->copy;
4869 nfserr = nfsd42_encode_write_res(resp, ©->cp_res,
4870 nfsd4_copy_is_sync(copy));
4874 p = xdr_reserve_space(resp->xdr, 4 + 4);
4875 *p++ = xdr_one; /* cr_consecutive */
4876 *p = nfsd4_copy_is_sync(copy) ? xdr_one : xdr_zero;
4881 nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr,
4882 union nfsd4_op_u *u)
4884 struct nfsd4_offload_status *os = &u->offload_status;
4885 struct xdr_stream *xdr = resp->xdr;
4888 p = xdr_reserve_space(xdr, 8 + 4);
4890 return nfserr_resource;
4891 p = xdr_encode_hyper(p, os->count);
4892 *p++ = cpu_to_be32(0);
4897 nfsd4_encode_read_plus_data(struct nfsd4_compoundres *resp,
4898 struct nfsd4_read *read)
4900 bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags);
4901 struct file *file = read->rd_nf->nf_file;
4902 struct xdr_stream *xdr = resp->xdr;
4903 unsigned long maxcount;
4906 /* Content type, offset, byte count */
4907 p = xdr_reserve_space(xdr, 4 + 8 + 4);
4910 if (resp->xdr->buf->page_len && splice_ok) {
4911 WARN_ON_ONCE(splice_ok);
4912 return nfserr_serverfault;
4915 maxcount = min_t(unsigned long, read->rd_length,
4916 (xdr->buf->buflen - xdr->buf->len));
4918 if (file->f_op->splice_read && splice_ok)
4919 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
4921 nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
4925 *p++ = cpu_to_be32(NFS4_CONTENT_DATA);
4926 p = xdr_encode_hyper(p, read->rd_offset);
4927 *p = cpu_to_be32(read->rd_length);
4933 nfsd4_encode_read_plus(struct nfsd4_compoundres *resp, __be32 nfserr,
4934 union nfsd4_op_u *u)
4936 struct nfsd4_read *read = &u->read;
4937 struct file *file = read->rd_nf->nf_file;
4938 struct xdr_stream *xdr = resp->xdr;
4939 int starting_len = xdr->buf->len;
4946 /* eof flag, segment count */
4947 p = xdr_reserve_space(xdr, 4 + 4);
4950 xdr_commit_encode(xdr);
4952 read->rd_eof = read->rd_offset >= i_size_read(file_inode(file));
4956 nfserr = nfsd4_encode_read_plus_data(resp, read);
4958 xdr_truncate_encode(xdr, starting_len);
4965 p = xdr_encode_bool(p, read->rd_eof);
4966 *p = cpu_to_be32(segments);
4971 nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr,
4972 union nfsd4_op_u *u)
4974 struct nfsd4_copy_notify *cn = &u->copy_notify;
4975 struct xdr_stream *xdr = resp->xdr;
4982 p = xdr_reserve_space(xdr, 12);
4984 return nfserr_resource;
4986 /* cnr_lease_time */
4987 p = xdr_encode_hyper(p, cn->cpn_sec);
4988 *p++ = cpu_to_be32(cn->cpn_nsec);
4991 nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid);
4995 /* cnr_src.nl_nsvr */
4996 p = xdr_reserve_space(xdr, 4);
4998 return nfserr_resource;
5000 *p++ = cpu_to_be32(1);
5002 nfserr = nfsd42_encode_nl4_server(resp, cn->cpn_src);
5007 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr,
5008 union nfsd4_op_u *u)
5010 struct nfsd4_seek *seek = &u->seek;
5013 p = xdr_reserve_space(resp->xdr, 4 + 8);
5014 *p++ = cpu_to_be32(seek->seek_eof);
5015 p = xdr_encode_hyper(p, seek->seek_pos);
5021 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr,
5022 union nfsd4_op_u *p)
5028 * Encode kmalloc-ed buffer in to XDR stream.
5031 nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen)
5036 cplen = min_t(unsigned long, buflen,
5037 ((void *)xdr->end - (void *)xdr->p));
5038 p = xdr_reserve_space(xdr, cplen);
5040 return nfserr_resource;
5042 memcpy(p, buf, cplen);
5047 cplen = min_t(u32, buflen, PAGE_SIZE);
5048 p = xdr_reserve_space(xdr, cplen);
5050 return nfserr_resource;
5052 memcpy(p, buf, cplen);
5054 if (cplen < PAGE_SIZE) {
5056 * We're done, with a length that wasn't page
5057 * aligned, so possibly not word aligned. Pad
5058 * any trailing bytes with 0.
5060 xdr_encode_opaque_fixed(p, NULL, cplen);
5064 buflen -= PAGE_SIZE;
5072 nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5073 union nfsd4_op_u *u)
5075 struct nfsd4_getxattr *getxattr = &u->getxattr;
5076 struct xdr_stream *xdr = resp->xdr;
5079 p = xdr_reserve_space(xdr, 4);
5081 return nfserr_resource;
5083 *p = cpu_to_be32(getxattr->getxa_len);
5085 if (getxattr->getxa_len == 0)
5088 err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf,
5089 getxattr->getxa_len);
5091 kvfree(getxattr->getxa_buf);
5097 nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5098 union nfsd4_op_u *u)
5100 struct nfsd4_setxattr *setxattr = &u->setxattr;
5101 struct xdr_stream *xdr = resp->xdr;
5104 p = xdr_reserve_space(xdr, 20);
5106 return nfserr_resource;
5108 encode_cinfo(p, &setxattr->setxa_cinfo);
5114 * See if there are cookie values that can be rejected outright.
5117 nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs,
5120 u64 cookie = listxattrs->lsxa_cookie;
5123 * If the cookie is larger than the maximum number we can fit
5124 * in either the buffer we just got back from vfs_listxattr, or,
5125 * XDR-encoded, in the return buffer, it's invalid.
5127 if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2))
5128 return nfserr_badcookie;
5130 if (cookie > (listxattrs->lsxa_maxcount /
5131 (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4)))
5132 return nfserr_badcookie;
5134 *offsetp = (u32)cookie;
5139 nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr,
5140 union nfsd4_op_u *u)
5142 struct nfsd4_listxattrs *listxattrs = &u->listxattrs;
5143 struct xdr_stream *xdr = resp->xdr;
5144 u32 cookie_offset, count_offset, eof;
5145 u32 left, xdrleft, slen, count;
5155 status = nfsd4_listxattr_validate_cookie(listxattrs, &offset);
5160 * Reserve space for the cookie and the name array count. Record
5161 * the offsets to save them later.
5163 cookie_offset = xdr->buf->len;
5164 count_offset = cookie_offset + 8;
5165 p = xdr_reserve_space(xdr, 12);
5167 status = nfserr_resource;
5172 left = listxattrs->lsxa_len;
5173 sp = listxattrs->lsxa_buf;
5176 xdrleft = listxattrs->lsxa_maxcount;
5178 while (left > 0 && xdrleft > 0) {
5182 * Check if this is a "user." attribute, skip it if not.
5184 if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN))
5187 slen -= XATTR_USER_PREFIX_LEN;
5188 xdrlen = 4 + ((slen + 3) & ~3);
5189 if (xdrlen > xdrleft) {
5192 * Can't even fit the first attribute name.
5194 status = nfserr_toosmall;
5201 left -= XATTR_USER_PREFIX_LEN;
5202 sp += XATTR_USER_PREFIX_LEN;
5203 if (nuser++ < offset)
5207 p = xdr_reserve_space(xdr, xdrlen);
5209 status = nfserr_resource;
5213 xdr_encode_opaque(p, sp, slen);
5223 * If there were user attributes to copy, but we didn't copy
5224 * any, the offset was too large (e.g. the cookie was invalid).
5226 if (nuser > 0 && count == 0) {
5227 status = nfserr_badcookie;
5232 p = xdr_reserve_space(xdr, 4);
5234 status = nfserr_resource;
5237 *p = cpu_to_be32(eof);
5239 cookie = offset + count;
5241 write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8);
5242 tmp = cpu_to_be32(count);
5243 write_bytes_to_xdr_buf(xdr->buf, count_offset, &tmp, 4);
5245 if (listxattrs->lsxa_len)
5246 kvfree(listxattrs->lsxa_buf);
5251 nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5252 union nfsd4_op_u *u)
5254 struct nfsd4_removexattr *removexattr = &u->removexattr;
5255 struct xdr_stream *xdr = resp->xdr;
5258 p = xdr_reserve_space(xdr, 20);
5260 return nfserr_resource;
5262 p = encode_cinfo(p, &removexattr->rmxa_cinfo);
5266 typedef __be32(*nfsd4_enc)(struct nfsd4_compoundres *, __be32, union nfsd4_op_u *u);
5269 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
5270 * since we don't need to filter out obsolete ops as this is
5271 * done in the decoding phase.
5273 static const nfsd4_enc nfsd4_enc_ops[] = {
5274 [OP_ACCESS] = nfsd4_encode_access,
5275 [OP_CLOSE] = nfsd4_encode_close,
5276 [OP_COMMIT] = nfsd4_encode_commit,
5277 [OP_CREATE] = nfsd4_encode_create,
5278 [OP_DELEGPURGE] = nfsd4_encode_noop,
5279 [OP_DELEGRETURN] = nfsd4_encode_noop,
5280 [OP_GETATTR] = nfsd4_encode_getattr,
5281 [OP_GETFH] = nfsd4_encode_getfh,
5282 [OP_LINK] = nfsd4_encode_link,
5283 [OP_LOCK] = nfsd4_encode_lock,
5284 [OP_LOCKT] = nfsd4_encode_lockt,
5285 [OP_LOCKU] = nfsd4_encode_locku,
5286 [OP_LOOKUP] = nfsd4_encode_noop,
5287 [OP_LOOKUPP] = nfsd4_encode_noop,
5288 [OP_NVERIFY] = nfsd4_encode_noop,
5289 [OP_OPEN] = nfsd4_encode_open,
5290 [OP_OPENATTR] = nfsd4_encode_noop,
5291 [OP_OPEN_CONFIRM] = nfsd4_encode_open_confirm,
5292 [OP_OPEN_DOWNGRADE] = nfsd4_encode_open_downgrade,
5293 [OP_PUTFH] = nfsd4_encode_noop,
5294 [OP_PUTPUBFH] = nfsd4_encode_noop,
5295 [OP_PUTROOTFH] = nfsd4_encode_noop,
5296 [OP_READ] = nfsd4_encode_read,
5297 [OP_READDIR] = nfsd4_encode_readdir,
5298 [OP_READLINK] = nfsd4_encode_readlink,
5299 [OP_REMOVE] = nfsd4_encode_remove,
5300 [OP_RENAME] = nfsd4_encode_rename,
5301 [OP_RENEW] = nfsd4_encode_noop,
5302 [OP_RESTOREFH] = nfsd4_encode_noop,
5303 [OP_SAVEFH] = nfsd4_encode_noop,
5304 [OP_SECINFO] = nfsd4_encode_secinfo,
5305 [OP_SETATTR] = nfsd4_encode_setattr,
5306 [OP_SETCLIENTID] = nfsd4_encode_setclientid,
5307 [OP_SETCLIENTID_CONFIRM] = nfsd4_encode_noop,
5308 [OP_VERIFY] = nfsd4_encode_noop,
5309 [OP_WRITE] = nfsd4_encode_write,
5310 [OP_RELEASE_LOCKOWNER] = nfsd4_encode_noop,
5312 /* NFSv4.1 operations */
5313 [OP_BACKCHANNEL_CTL] = nfsd4_encode_noop,
5314 [OP_BIND_CONN_TO_SESSION] = nfsd4_encode_bind_conn_to_session,
5315 [OP_EXCHANGE_ID] = nfsd4_encode_exchange_id,
5316 [OP_CREATE_SESSION] = nfsd4_encode_create_session,
5317 [OP_DESTROY_SESSION] = nfsd4_encode_noop,
5318 [OP_FREE_STATEID] = nfsd4_encode_noop,
5319 [OP_GET_DIR_DELEGATION] = nfsd4_encode_noop,
5320 #ifdef CONFIG_NFSD_PNFS
5321 [OP_GETDEVICEINFO] = nfsd4_encode_getdeviceinfo,
5322 [OP_GETDEVICELIST] = nfsd4_encode_noop,
5323 [OP_LAYOUTCOMMIT] = nfsd4_encode_layoutcommit,
5324 [OP_LAYOUTGET] = nfsd4_encode_layoutget,
5325 [OP_LAYOUTRETURN] = nfsd4_encode_layoutreturn,
5327 [OP_GETDEVICEINFO] = nfsd4_encode_noop,
5328 [OP_GETDEVICELIST] = nfsd4_encode_noop,
5329 [OP_LAYOUTCOMMIT] = nfsd4_encode_noop,
5330 [OP_LAYOUTGET] = nfsd4_encode_noop,
5331 [OP_LAYOUTRETURN] = nfsd4_encode_noop,
5333 [OP_SECINFO_NO_NAME] = nfsd4_encode_secinfo_no_name,
5334 [OP_SEQUENCE] = nfsd4_encode_sequence,
5335 [OP_SET_SSV] = nfsd4_encode_noop,
5336 [OP_TEST_STATEID] = nfsd4_encode_test_stateid,
5337 [OP_WANT_DELEGATION] = nfsd4_encode_noop,
5338 [OP_DESTROY_CLIENTID] = nfsd4_encode_noop,
5339 [OP_RECLAIM_COMPLETE] = nfsd4_encode_noop,
5341 /* NFSv4.2 operations */
5342 [OP_ALLOCATE] = nfsd4_encode_noop,
5343 [OP_COPY] = nfsd4_encode_copy,
5344 [OP_COPY_NOTIFY] = nfsd4_encode_copy_notify,
5345 [OP_DEALLOCATE] = nfsd4_encode_noop,
5346 [OP_IO_ADVISE] = nfsd4_encode_noop,
5347 [OP_LAYOUTERROR] = nfsd4_encode_noop,
5348 [OP_LAYOUTSTATS] = nfsd4_encode_noop,
5349 [OP_OFFLOAD_CANCEL] = nfsd4_encode_noop,
5350 [OP_OFFLOAD_STATUS] = nfsd4_encode_offload_status,
5351 [OP_READ_PLUS] = nfsd4_encode_read_plus,
5352 [OP_SEEK] = nfsd4_encode_seek,
5353 [OP_WRITE_SAME] = nfsd4_encode_noop,
5354 [OP_CLONE] = nfsd4_encode_noop,
5356 /* RFC 8276 extended atributes operations */
5357 [OP_GETXATTR] = nfsd4_encode_getxattr,
5358 [OP_SETXATTR] = nfsd4_encode_setxattr,
5359 [OP_LISTXATTRS] = nfsd4_encode_listxattrs,
5360 [OP_REMOVEXATTR] = nfsd4_encode_removexattr,
5364 * Calculate whether we still have space to encode repsize bytes.
5365 * There are two considerations:
5366 * - For NFS versions >=4.1, the size of the reply must stay within
5368 * - For all NFS versions, we must stay within limited preallocated
5371 * This is called before the operation is processed, so can only provide
5372 * an upper estimate. For some nonidempotent operations (such as
5373 * getattr), it's not necessarily a problem if that estimate is wrong,
5374 * as we can fail it after processing without significant side effects.
5376 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
5378 struct xdr_buf *buf = &resp->rqstp->rq_res;
5379 struct nfsd4_slot *slot = resp->cstate.slot;
5381 if (buf->len + respsize <= buf->buflen)
5383 if (!nfsd4_has_session(&resp->cstate))
5384 return nfserr_resource;
5385 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
5387 return nfserr_rep_too_big_to_cache;
5389 return nfserr_rep_too_big;
5393 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
5395 struct xdr_stream *xdr = resp->xdr;
5396 struct nfs4_stateowner *so = resp->cstate.replay_owner;
5397 struct svc_rqst *rqstp = resp->rqstp;
5398 const struct nfsd4_operation *opdesc = op->opdesc;
5399 int post_err_offset;
5403 p = xdr_reserve_space(xdr, 8);
5406 *p++ = cpu_to_be32(op->opnum);
5407 post_err_offset = xdr->buf->len;
5409 if (op->opnum == OP_ILLEGAL)
5411 if (op->status && opdesc &&
5412 !(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE))
5414 BUG_ON(op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
5415 !nfsd4_enc_ops[op->opnum]);
5416 encoder = nfsd4_enc_ops[op->opnum];
5417 op->status = encoder(resp, op->status, &op->u);
5419 trace_nfsd_compound_encode_err(rqstp, op->opnum, op->status);
5420 xdr_commit_encode(xdr);
5422 /* nfsd4_check_resp_size guarantees enough room for error status */
5424 int space_needed = 0;
5425 if (!nfsd4_last_compound_op(rqstp))
5426 space_needed = COMPOUND_ERR_SLACK_SPACE;
5427 op->status = nfsd4_check_resp_size(resp, space_needed);
5429 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
5430 struct nfsd4_slot *slot = resp->cstate.slot;
5432 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
5433 op->status = nfserr_rep_too_big_to_cache;
5435 op->status = nfserr_rep_too_big;
5437 if (op->status == nfserr_resource ||
5438 op->status == nfserr_rep_too_big ||
5439 op->status == nfserr_rep_too_big_to_cache) {
5441 * The operation may have already been encoded or
5442 * partially encoded. No op returns anything additional
5443 * in the case of one of these three errors, so we can
5444 * just truncate back to after the status. But it's a
5445 * bug if we had to do this on a non-idempotent op:
5447 warn_on_nonidempotent_op(op);
5448 xdr_truncate_encode(xdr, post_err_offset);
5451 int len = xdr->buf->len - post_err_offset;
5453 so->so_replay.rp_status = op->status;
5454 so->so_replay.rp_buflen = len;
5455 read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
5456 so->so_replay.rp_buf, len);
5461 if (opdesc && opdesc->op_release)
5462 opdesc->op_release(&op->u);
5466 * Encode the reply stored in the stateowner reply cache
5468 * XDR note: do not encode rp->rp_buflen: the buffer contains the
5469 * previously sent already encoded operation.
5472 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
5475 struct nfs4_replay *rp = op->replay;
5477 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
5482 *p++ = cpu_to_be32(op->opnum);
5483 *p++ = rp->rp_status; /* already xdr'ed */
5485 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
5488 void nfsd4_release_compoundargs(struct svc_rqst *rqstp)
5490 struct nfsd4_compoundargs *args = rqstp->rq_argp;
5492 if (args->ops != args->iops) {
5494 args->ops = args->iops;
5496 while (args->to_free) {
5497 struct svcxdr_tmpbuf *tb = args->to_free;
5498 args->to_free = tb->next;
5504 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, struct xdr_stream *xdr)
5506 struct nfsd4_compoundargs *args = rqstp->rq_argp;
5508 /* svcxdr_tmp_alloc */
5509 args->to_free = NULL;
5512 args->ops = args->iops;
5513 args->rqstp = rqstp;
5515 return nfsd4_decode_compound(args);
5519 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, struct xdr_stream *xdr)
5521 struct nfsd4_compoundres *resp = rqstp->rq_resp;
5525 * Send buffer space for the following items is reserved
5526 * at the top of nfsd4_proc_compound().
5530 *p++ = resp->cstate.status;
5532 rqstp->rq_next_page = xdr->page_ptr + 1;
5534 *p++ = htonl(resp->taglen);
5535 memcpy(p, resp->tag, resp->taglen);
5536 p += XDR_QUADLEN(resp->taglen);
5537 *p++ = htonl(resp->opcnt);
5539 nfsd4_sequence_done(resp);