| /* |
| * Server-side XDR for NFSv4 |
| * |
| * Copyright (c) 2002 The Regents of the University of Michigan. |
| * All rights reserved. |
| * |
| * Kendrick Smith <kmsmith@umich.edu> |
| * Andy Adamson <andros@umich.edu> |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * 3. Neither the name of the University nor the names of its |
| * contributors may be used to endorse or promote products derived |
| * from this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED |
| * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF |
| * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
| * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR |
| * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF |
| * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING |
| * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
| * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include <linux/file.h> |
| #include <linux/slab.h> |
| #include <linux/namei.h> |
| #include <linux/statfs.h> |
| #include <linux/utsname.h> |
| #include <linux/pagemap.h> |
| #include <linux/sunrpc/svcauth_gss.h> |
| #include <linux/sunrpc/addr.h> |
| #include <linux/xattr.h> |
| #include <linux/vmalloc.h> |
| |
| #include <uapi/linux/xattr.h> |
| |
| #include "idmap.h" |
| #include "acl.h" |
| #include "xdr4.h" |
| #include "vfs.h" |
| #include "state.h" |
| #include "cache.h" |
| #include "netns.h" |
| #include "pnfs.h" |
| #include "filecache.h" |
| |
| #include "trace.h" |
| |
| #ifdef CONFIG_NFSD_V4_SECURITY_LABEL |
| #include <linux/security.h> |
| #endif |
| |
| |
| #define NFSDDBG_FACILITY NFSDDBG_XDR |
| |
| const u32 nfsd_suppattrs[3][3] = { |
| {NFSD4_SUPPORTED_ATTRS_WORD0, |
| NFSD4_SUPPORTED_ATTRS_WORD1, |
| NFSD4_SUPPORTED_ATTRS_WORD2}, |
| |
| {NFSD4_1_SUPPORTED_ATTRS_WORD0, |
| NFSD4_1_SUPPORTED_ATTRS_WORD1, |
| NFSD4_1_SUPPORTED_ATTRS_WORD2}, |
| |
| {NFSD4_1_SUPPORTED_ATTRS_WORD0, |
| NFSD4_1_SUPPORTED_ATTRS_WORD1, |
| NFSD4_2_SUPPORTED_ATTRS_WORD2}, |
| }; |
| |
| /* |
| * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing |
| * directory in order to indicate to the client that a filesystem boundary is present |
| * We use a fixed fsid for a referral |
| */ |
| #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL |
| #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL |
| |
| static __be32 |
| check_filename(char *str, int len) |
| { |
| int i; |
| |
| if (len == 0) |
| return nfserr_inval; |
| if (len > NFS4_MAXNAMLEN) |
| return nfserr_nametoolong; |
| if (isdotent(str, len)) |
| return nfserr_badname; |
| for (i = 0; i < len; i++) |
| if (str[i] == '/') |
| return nfserr_badname; |
| return 0; |
| } |
| |
| static int zero_clientid(clientid_t *clid) |
| { |
| return (clid->cl_boot == 0) && (clid->cl_id == 0); |
| } |
| |
| /** |
| * svcxdr_tmpalloc - allocate memory to be freed after compound processing |
| * @argp: NFSv4 compound argument structure |
| * @len: length of buffer to allocate |
| * |
| * Allocates a buffer of size @len to be freed when processing the compound |
| * operation described in @argp finishes. |
| */ |
| static void * |
| svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, size_t len) |
| { |
| struct svcxdr_tmpbuf *tb; |
| |
| tb = kmalloc(struct_size(tb, buf, len), GFP_KERNEL); |
| if (!tb) |
| return NULL; |
| tb->next = argp->to_free; |
| argp->to_free = tb; |
| return tb->buf; |
| } |
| |
| /* |
| * For xdr strings that need to be passed to other kernel api's |
| * as null-terminated strings. |
| * |
| * Note null-terminating in place usually isn't safe since the |
| * buffer might end on a page boundary. |
| */ |
| static char * |
| svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, size_t len) |
| { |
| char *p = svcxdr_tmpalloc(argp, size_add(len, 1)); |
| |
| if (!p) |
| return NULL; |
| memcpy(p, buf, len); |
| p[len] = '\0'; |
| return p; |
| } |
| |
| static void * |
| svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, size_t len) |
| { |
| __be32 *tmp; |
| |
| /* |
| * The location of the decoded data item is stable, |
| * so @p is OK to use. This is the common case. |
| */ |
| if (p != argp->xdr->scratch.iov_base) |
| return p; |
| |
| tmp = svcxdr_tmpalloc(argp, len); |
| if (!tmp) |
| return NULL; |
| memcpy(tmp, p, len); |
| return tmp; |
| } |
| |
| /* |
| * NFSv4 basic data type decoders |
| */ |
| |
| /* |
| * This helper handles variable-length opaques which belong to protocol |
| * elements that this implementation does not support. |
| */ |
| static __be32 |
| nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen) |
| { |
| u32 len; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &len) < 0) |
| return nfserr_bad_xdr; |
| if (maxlen && len > maxlen) |
| return nfserr_bad_xdr; |
| if (!xdr_inline_decode(argp->xdr, len)) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o) |
| { |
| __be32 *p; |
| u32 len; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &len) < 0) |
| return nfserr_bad_xdr; |
| if (len == 0 || len > NFS4_OPAQUE_LIMIT) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, len); |
| if (!p) |
| return nfserr_bad_xdr; |
| o->data = svcxdr_savemem(argp, p, len); |
| if (!o->data) |
| return nfserr_jukebox; |
| o->len = len; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp) |
| { |
| __be32 *p, status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, lenp) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, *lenp); |
| if (!p) |
| return nfserr_bad_xdr; |
| status = check_filename((char *)p, *lenp); |
| if (status) |
| return status; |
| *namp = svcxdr_savemem(argp, p, *lenp); |
| if (!*namp) |
| return nfserr_jukebox; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3); |
| if (!p) |
| return nfserr_bad_xdr; |
| p = xdr_decode_hyper(p, &tv->tv_sec); |
| tv->tv_nsec = be32_to_cpup(p++); |
| if (tv->tv_nsec >= (u32)1000000000) |
| return nfserr_inval; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE); |
| if (!p) |
| return nfserr_bad_xdr; |
| memcpy(verf->data, p, sizeof(verf->data)); |
| return nfs_ok; |
| } |
| |
| /** |
| * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4 |
| * @argp: NFSv4 compound argument structure |
| * @bmval: pointer to an array of u32's to decode into |
| * @bmlen: size of the @bmval array |
| * |
| * The server needs to return nfs_ok rather than nfserr_bad_xdr when |
| * encountering bitmaps containing bits it does not recognize. This |
| * includes bits in bitmap words past WORDn, where WORDn is the last |
| * bitmap WORD the implementation currently supports. Thus we are |
| * careful here to simply ignore bits in bitmap words that this |
| * implementation has yet to support explicitly. |
| * |
| * Return values: |
| * %nfs_ok: @bmval populated successfully |
| * %nfserr_bad_xdr: the encoded bitmap was invalid |
| */ |
| static __be32 |
| nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen) |
| { |
| ssize_t status; |
| |
| status = xdr_stream_decode_uint32_array(argp->xdr, bmval, bmlen); |
| return status == -EBADMSG ? nfserr_bad_xdr : nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace) |
| { |
| __be32 *p, status; |
| u32 length; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0) |
| return nfserr_bad_xdr; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &length) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, length); |
| if (!p) |
| return nfserr_bad_xdr; |
| ace->whotype = nfs4_acl_get_whotype((char *)p, length); |
| if (ace->whotype != NFS4_ACL_WHO_NAMED) |
| status = nfs_ok; |
| else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) |
| status = nfsd_map_name_to_gid(argp->rqstp, |
| (char *)p, length, &ace->who_gid); |
| else |
| status = nfsd_map_name_to_uid(argp->rqstp, |
| (char *)p, length, &ace->who_uid); |
| |
| return status; |
| } |
| |
| /* A counted array of nfsace4's */ |
| static noinline __be32 |
| nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl) |
| { |
| struct nfs4_ace *ace; |
| __be32 status; |
| u32 count; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &count) < 0) |
| return nfserr_bad_xdr; |
| |
| if (count > xdr_stream_remaining(argp->xdr) / 20) |
| /* |
| * Even with 4-byte names there wouldn't be |
| * space for that many aces; something fishy is |
| * going on: |
| */ |
| return nfserr_fbig; |
| |
| *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count)); |
| if (*acl == NULL) |
| return nfserr_jukebox; |
| |
| (*acl)->naces = count; |
| for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) { |
| status = nfsd4_decode_nfsace4(argp, ace); |
| if (status) |
| return status; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static noinline __be32 |
| nfsd4_decode_security_label(struct nfsd4_compoundargs *argp, |
| struct xdr_netobj *label) |
| { |
| u32 lfs, pi, length; |
| __be32 *p; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &pi) < 0) |
| return nfserr_bad_xdr; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &length) < 0) |
| return nfserr_bad_xdr; |
| if (length > NFS4_MAXLABELLEN) |
| return nfserr_badlabel; |
| p = xdr_inline_decode(argp->xdr, length); |
| if (!p) |
| return nfserr_bad_xdr; |
| label->len = length; |
| label->data = svcxdr_dupstr(argp, p, length); |
| if (!label->data) |
| return nfserr_jukebox; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen, |
| struct iattr *iattr, struct nfs4_acl **acl, |
| struct xdr_netobj *label, int *umask) |
| { |
| unsigned int starting_pos; |
| u32 attrlist4_count; |
| __be32 *p, status; |
| |
| iattr->ia_valid = 0; |
| status = nfsd4_decode_bitmap4(argp, bmval, bmlen); |
| if (status) |
| return nfserr_bad_xdr; |
| |
| if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0 |
| || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1 |
| || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) { |
| if (nfsd_attrs_supported(argp->minorversion, bmval)) |
| return nfserr_inval; |
| return nfserr_attrnotsupp; |
| } |
| |
| if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0) |
| return nfserr_bad_xdr; |
| starting_pos = xdr_stream_pos(argp->xdr); |
| |
| if (bmval[0] & FATTR4_WORD0_SIZE) { |
| u64 size; |
| |
| if (xdr_stream_decode_u64(argp->xdr, &size) < 0) |
| return nfserr_bad_xdr; |
| iattr->ia_size = size; |
| iattr->ia_valid |= ATTR_SIZE; |
| } |
| if (bmval[0] & FATTR4_WORD0_ACL) { |
| status = nfsd4_decode_acl(argp, acl); |
| if (status) |
| return status; |
| } else |
| *acl = NULL; |
| if (bmval[1] & FATTR4_WORD1_MODE) { |
| u32 mode; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &mode) < 0) |
| return nfserr_bad_xdr; |
| iattr->ia_mode = mode; |
| iattr->ia_mode &= (S_IFMT | S_IALLUGO); |
| iattr->ia_valid |= ATTR_MODE; |
| } |
| if (bmval[1] & FATTR4_WORD1_OWNER) { |
| u32 length; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &length) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, length); |
| if (!p) |
| return nfserr_bad_xdr; |
| status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length, |
| &iattr->ia_uid); |
| if (status) |
| return status; |
| iattr->ia_valid |= ATTR_UID; |
| } |
| if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) { |
| u32 length; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &length) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, length); |
| if (!p) |
| return nfserr_bad_xdr; |
| status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length, |
| &iattr->ia_gid); |
| if (status) |
| return status; |
| iattr->ia_valid |= ATTR_GID; |
| } |
| if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) { |
| u32 set_it; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0) |
| return nfserr_bad_xdr; |
| switch (set_it) { |
| case NFS4_SET_TO_CLIENT_TIME: |
| status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime); |
| if (status) |
| return status; |
| iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); |
| break; |
| case NFS4_SET_TO_SERVER_TIME: |
| iattr->ia_valid |= ATTR_ATIME; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| } |
| if (bmval[1] & FATTR4_WORD1_TIME_CREATE) { |
| struct timespec64 ts; |
| |
| /* No Linux filesystem supports setting this attribute. */ |
| bmval[1] &= ~FATTR4_WORD1_TIME_CREATE; |
| status = nfsd4_decode_nfstime4(argp, &ts); |
| if (status) |
| return status; |
| } |
| if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) { |
| u32 set_it; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0) |
| return nfserr_bad_xdr; |
| switch (set_it) { |
| case NFS4_SET_TO_CLIENT_TIME: |
| status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime); |
| if (status) |
| return status; |
| iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); |
| break; |
| case NFS4_SET_TO_SERVER_TIME: |
| iattr->ia_valid |= ATTR_MTIME; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| } |
| label->len = 0; |
| if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) && |
| bmval[2] & FATTR4_WORD2_SECURITY_LABEL) { |
| status = nfsd4_decode_security_label(argp, label); |
| if (status) |
| return status; |
| } |
| if (bmval[2] & FATTR4_WORD2_MODE_UMASK) { |
| u32 mode, mask; |
| |
| if (!umask) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &mode) < 0) |
| return nfserr_bad_xdr; |
| iattr->ia_mode = mode & (S_IFMT | S_IALLUGO); |
| if (xdr_stream_decode_u32(argp->xdr, &mask) < 0) |
| return nfserr_bad_xdr; |
| *umask = mask & S_IRWXUGO; |
| iattr->ia_valid |= ATTR_MODE; |
| } |
| |
| /* request sanity: did attrlist4 contain the expected number of words? */ |
| if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE); |
| if (!p) |
| return nfserr_bad_xdr; |
| sid->si_generation = be32_to_cpup(p++); |
| memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque)); |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, sizeof(__be64)); |
| if (!p) |
| return nfserr_bad_xdr; |
| memcpy(clientid, p, sizeof(*clientid)); |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp, |
| clientid_t *clientid, struct xdr_netobj *owner) |
| { |
| __be32 status; |
| |
| status = nfsd4_decode_clientid4(argp, clientid); |
| if (status) |
| return status; |
| return nfsd4_decode_opaque(argp, owner); |
| } |
| |
| #ifdef CONFIG_NFSD_PNFS |
| static __be32 |
| nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_deviceid *devid) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE); |
| if (!p) |
| return nfserr_bad_xdr; |
| memcpy(devid, p, sizeof(*devid)); |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_layoutcommit *lcp) |
| { |
| if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0) |
| return nfserr_bad_xdr; |
| if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES) |
| return nfserr_bad_xdr; |
| if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX) |
| return nfserr_bad_xdr; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0) |
| return nfserr_bad_xdr; |
| if (lcp->lc_up_len > 0) { |
| lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len); |
| if (!lcp->lc_up_layout) |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_layoutreturn *lrp) |
| { |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0) |
| return nfserr_bad_xdr; |
| switch (lrp->lr_return_type) { |
| case RETURN_FILE: |
| if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_stateid4(argp, &lrp->lr_sid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0) |
| return nfserr_bad_xdr; |
| if (lrp->lrf_body_len > 0) { |
| lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len); |
| if (!lrp->lrf_body) |
| return nfserr_bad_xdr; |
| } |
| break; |
| case RETURN_FSID: |
| case RETURN_ALL: |
| lrp->lr_seg.offset = 0; |
| lrp->lr_seg.length = NFS4_MAX_UINT64; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| #endif /* CONFIG_NFSD_PNFS */ |
| |
| static __be32 |
| nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp, |
| struct nfs4_sessionid *sessionid) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN); |
| if (!p) |
| return nfserr_bad_xdr; |
| memcpy(sessionid->data, p, sizeof(sessionid->data)); |
| return nfs_ok; |
| } |
| |
| /* Defined in Appendix A of RFC 5531 */ |
| static __be32 |
| nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp, |
| struct nfsd4_cb_sec *cbs) |
| { |
| u32 stamp, gidcount, uid, gid; |
| __be32 *p, status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0) |
| return nfserr_bad_xdr; |
| /* machine name */ |
| status = nfsd4_decode_ignored_string(argp, 255); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &uid) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &gid) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0) |
| return nfserr_bad_xdr; |
| if (gidcount > 16) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, gidcount << 2); |
| if (!p) |
| return nfserr_bad_xdr; |
| if (cbs->flavor == (u32)(-1)) { |
| struct user_namespace *userns = nfsd_user_namespace(argp->rqstp); |
| |
| kuid_t kuid = make_kuid(userns, uid); |
| kgid_t kgid = make_kgid(userns, gid); |
| if (uid_valid(kuid) && gid_valid(kgid)) { |
| cbs->uid = kuid; |
| cbs->gid = kgid; |
| cbs->flavor = RPC_AUTH_UNIX; |
| } else { |
| dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n"); |
| } |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_cb_sec *cbs) |
| { |
| __be32 status; |
| u32 service; |
| |
| dprintk("RPC_AUTH_GSS callback secflavor not supported!\n"); |
| |
| if (xdr_stream_decode_u32(argp->xdr, &service) < 0) |
| return nfserr_bad_xdr; |
| if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY) |
| return nfserr_bad_xdr; |
| /* gcbp_handle_from_server */ |
| status = nfsd4_decode_ignored_string(argp, 0); |
| if (status) |
| return status; |
| /* gcbp_handle_from_client */ |
| status = nfsd4_decode_ignored_string(argp, 0); |
| if (status) |
| return status; |
| |
| return nfs_ok; |
| } |
| |
| /* a counted array of callback_sec_parms4 items */ |
| static __be32 |
| nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs) |
| { |
| u32 i, secflavor, nr_secflavs; |
| __be32 status; |
| |
| /* callback_sec_params4 */ |
| if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0) |
| return nfserr_bad_xdr; |
| if (nr_secflavs) |
| cbs->flavor = (u32)(-1); |
| else |
| /* Is this legal? Be generous, take it to mean AUTH_NONE: */ |
| cbs->flavor = 0; |
| |
| for (i = 0; i < nr_secflavs; ++i) { |
| if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0) |
| return nfserr_bad_xdr; |
| switch (secflavor) { |
| case RPC_AUTH_NULL: |
| /* void */ |
| if (cbs->flavor == (u32)(-1)) |
| cbs->flavor = RPC_AUTH_NULL; |
| break; |
| case RPC_AUTH_UNIX: |
| status = nfsd4_decode_authsys_parms(argp, cbs); |
| if (status) |
| return status; |
| break; |
| case RPC_AUTH_GSS: |
| status = nfsd4_decode_gss_cb_handles4(argp, cbs); |
| if (status) |
| return status; |
| break; |
| default: |
| return nfserr_inval; |
| } |
| } |
| |
| return nfs_ok; |
| } |
| |
| |
| /* |
| * NFSv4 operation argument decoders |
| */ |
| |
| static __be32 |
| nfsd4_decode_access(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_access *access = &u->access; |
| if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0) |
| return nfserr_bad_xdr; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_close(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_close *close = &u->close; |
| if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_stateid4(argp, &close->cl_stateid); |
| } |
| |
| |
| static __be32 |
| nfsd4_decode_commit(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_commit *commit = &u->commit; |
| if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0) |
| return nfserr_bad_xdr; |
| memset(&commit->co_verf, 0, sizeof(commit->co_verf)); |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_create(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_create *create = &u->create; |
| __be32 *p, status; |
| |
| memset(create, 0, sizeof(*create)); |
| if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0) |
| return nfserr_bad_xdr; |
| switch (create->cr_type) { |
| case NF4LNK: |
| if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, create->cr_datalen); |
| if (!p) |
| return nfserr_bad_xdr; |
| create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen); |
| if (!create->cr_data) |
| return nfserr_jukebox; |
| break; |
| case NF4BLK: |
| case NF4CHR: |
| if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0) |
| return nfserr_bad_xdr; |
| break; |
| case NF4SOCK: |
| case NF4FIFO: |
| case NF4DIR: |
| default: |
| break; |
| } |
| status = nfsd4_decode_component4(argp, &create->cr_name, |
| &create->cr_namelen); |
| if (status) |
| return status; |
| status = nfsd4_decode_fattr4(argp, create->cr_bmval, |
| ARRAY_SIZE(create->cr_bmval), |
| &create->cr_iattr, &create->cr_acl, |
| &create->cr_label, &create->cr_umask); |
| if (status) |
| return status; |
| |
| return nfs_ok; |
| } |
| |
| static inline __be32 |
| nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_delegreturn *dr = &u->delegreturn; |
| return nfsd4_decode_stateid4(argp, &dr->dr_stateid); |
| } |
| |
| static inline __be32 |
| nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_getattr *getattr = &u->getattr; |
| memset(getattr, 0, sizeof(*getattr)); |
| return nfsd4_decode_bitmap4(argp, getattr->ga_bmval, |
| ARRAY_SIZE(getattr->ga_bmval)); |
| } |
| |
| static __be32 |
| nfsd4_decode_link(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_link *link = &u->link; |
| memset(link, 0, sizeof(*link)); |
| return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen); |
| } |
| |
| static __be32 |
| nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_lock *lock) |
| { |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid, |
| &lock->lk_new_owner); |
| } |
| |
| static __be32 |
| nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_lock *lock) |
| { |
| __be32 status; |
| |
| status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) |
| { |
| if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0) |
| return nfserr_bad_xdr; |
| if (lock->lk_is_new) |
| return nfsd4_decode_open_to_lock_owner4(argp, lock); |
| return nfsd4_decode_exist_lock_owner4(argp, lock); |
| } |
| |
| static __be32 |
| nfsd4_decode_lock(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_lock *lock = &u->lock; |
| memset(lock, 0, sizeof(*lock)); |
| if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0) |
| return nfserr_bad_xdr; |
| if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT)) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_locker4(argp, lock); |
| } |
| |
| static __be32 |
| nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_lockt *lockt = &u->lockt; |
| memset(lockt, 0, sizeof(*lockt)); |
| if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0) |
| return nfserr_bad_xdr; |
| if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT)) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid, |
| &lockt->lt_owner); |
| } |
| |
| static __be32 |
| nfsd4_decode_locku(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_locku *locku = &u->locku; |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0) |
| return nfserr_bad_xdr; |
| if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT)) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_stateid4(argp, &locku->lu_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_lookup *lookup = &u->lookup; |
| return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len); |
| } |
| |
| static __be32 |
| nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) |
| { |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0) |
| return nfserr_bad_xdr; |
| switch (open->op_createmode) { |
| case NFS4_CREATE_UNCHECKED: |
| case NFS4_CREATE_GUARDED: |
| status = nfsd4_decode_fattr4(argp, open->op_bmval, |
| ARRAY_SIZE(open->op_bmval), |
| &open->op_iattr, &open->op_acl, |
| &open->op_label, &open->op_umask); |
| if (status) |
| return status; |
| break; |
| case NFS4_CREATE_EXCLUSIVE: |
| status = nfsd4_decode_verifier4(argp, &open->op_verf); |
| if (status) |
| return status; |
| break; |
| case NFS4_CREATE_EXCLUSIVE4_1: |
| if (argp->minorversion < 1) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_verifier4(argp, &open->op_verf); |
| if (status) |
| return status; |
| status = nfsd4_decode_fattr4(argp, open->op_bmval, |
| ARRAY_SIZE(open->op_bmval), |
| &open->op_iattr, &open->op_acl, |
| &open->op_label, &open->op_umask); |
| if (status) |
| return status; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) |
| { |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0) |
| return nfserr_bad_xdr; |
| switch (open->op_create) { |
| case NFS4_OPEN_NOCREATE: |
| break; |
| case NFS4_OPEN_CREATE: |
| status = nfsd4_decode_createhow4(argp, open); |
| if (status) |
| return status; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when) |
| { |
| u32 w; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &w) < 0) |
| return nfserr_bad_xdr; |
| *share_access = w & NFS4_SHARE_ACCESS_MASK; |
| *deleg_want = w & NFS4_SHARE_WANT_MASK; |
| if (deleg_when) |
| *deleg_when = w & NFS4_SHARE_WHEN_MASK; |
| |
| switch (w & NFS4_SHARE_ACCESS_MASK) { |
| case NFS4_SHARE_ACCESS_READ: |
| case NFS4_SHARE_ACCESS_WRITE: |
| case NFS4_SHARE_ACCESS_BOTH: |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| w &= ~NFS4_SHARE_ACCESS_MASK; |
| if (!w) |
| return nfs_ok; |
| if (!argp->minorversion) |
| return nfserr_bad_xdr; |
| switch (w & NFS4_SHARE_WANT_MASK) { |
| case NFS4_SHARE_WANT_NO_PREFERENCE: |
| case NFS4_SHARE_WANT_READ_DELEG: |
| case NFS4_SHARE_WANT_WRITE_DELEG: |
| case NFS4_SHARE_WANT_ANY_DELEG: |
| case NFS4_SHARE_WANT_NO_DELEG: |
| case NFS4_SHARE_WANT_CANCEL: |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| w &= ~NFS4_SHARE_WANT_MASK; |
| if (!w) |
| return nfs_ok; |
| |
| if (!deleg_when) /* open_downgrade */ |
| return nfserr_inval; |
| switch (w) { |
| case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL: |
| case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED: |
| case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL | |
| NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED): |
| return nfs_ok; |
| } |
| return nfserr_bad_xdr; |
| } |
| |
| static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x) |
| { |
| if (xdr_stream_decode_u32(argp->xdr, x) < 0) |
| return nfserr_bad_xdr; |
| /* Note: unlike access bits, deny bits may be zero. */ |
| if (*x & ~NFS4_SHARE_DENY_BOTH) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_open *open) |
| { |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0) |
| return nfserr_bad_xdr; |
| switch (open->op_claim_type) { |
| case NFS4_OPEN_CLAIM_NULL: |
| case NFS4_OPEN_CLAIM_DELEGATE_PREV: |
| status = nfsd4_decode_component4(argp, &open->op_fname, |
| &open->op_fnamelen); |
| if (status) |
| return status; |
| break; |
| case NFS4_OPEN_CLAIM_PREVIOUS: |
| if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0) |
| return nfserr_bad_xdr; |
| break; |
| case NFS4_OPEN_CLAIM_DELEGATE_CUR: |
| status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid); |
| if (status) |
| return status; |
| status = nfsd4_decode_component4(argp, &open->op_fname, |
| &open->op_fnamelen); |
| if (status) |
| return status; |
| break; |
| case NFS4_OPEN_CLAIM_FH: |
| case NFS4_OPEN_CLAIM_DELEG_PREV_FH: |
| if (argp->minorversion < 1) |
| return nfserr_bad_xdr; |
| /* void */ |
| break; |
| case NFS4_OPEN_CLAIM_DELEG_CUR_FH: |
| if (argp->minorversion < 1) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid); |
| if (status) |
| return status; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_open(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_open *open = &u->open; |
| __be32 status; |
| u32 dummy; |
| |
| memset(open, 0, sizeof(*open)); |
| |
| if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0) |
| return nfserr_bad_xdr; |
| /* deleg_want is ignored */ |
| status = nfsd4_decode_share_access(argp, &open->op_share_access, |
| &open->op_deleg_want, &dummy); |
| if (status) |
| return status; |
| status = nfsd4_decode_share_deny(argp, &open->op_share_deny); |
| if (status) |
| return status; |
| status = nfsd4_decode_state_owner4(argp, &open->op_clientid, |
| &open->op_owner); |
| if (status) |
| return status; |
| status = nfsd4_decode_openflag4(argp, open); |
| if (status) |
| return status; |
| return nfsd4_decode_open_claim4(argp, open); |
| } |
| |
| static __be32 |
| nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_open_confirm *open_conf = &u->open_confirm; |
| __be32 status; |
| |
| if (argp->minorversion >= 1) |
| return nfserr_notsupp; |
| |
| status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0) |
| return nfserr_bad_xdr; |
| |
| memset(&open_conf->oc_resp_stateid, 0, |
| sizeof(open_conf->oc_resp_stateid)); |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_open_downgrade *open_down = &u->open_downgrade; |
| __be32 status; |
| |
| memset(open_down, 0, sizeof(*open_down)); |
| status = nfsd4_decode_stateid4(argp, &open_down->od_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0) |
| return nfserr_bad_xdr; |
| /* deleg_want is ignored */ |
| status = nfsd4_decode_share_access(argp, &open_down->od_share_access, |
| &open_down->od_deleg_want, NULL); |
| if (status) |
| return status; |
| return nfsd4_decode_share_deny(argp, &open_down->od_share_deny); |
| } |
| |
| static __be32 |
| nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_putfh *putfh = &u->putfh; |
| __be32 *p; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0) |
| return nfserr_bad_xdr; |
| if (putfh->pf_fhlen > NFS4_FHSIZE) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen); |
| if (!p) |
| return nfserr_bad_xdr; |
| putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen); |
| if (!putfh->pf_fhval) |
| return nfserr_jukebox; |
| |
| putfh->no_verify = false; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_read(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_read *read = &u->read; |
| __be32 status; |
| |
| memset(read, 0, sizeof(*read)); |
| status = nfsd4_decode_stateid4(argp, &read->rd_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_readdir *readdir = &u->readdir; |
| __be32 status; |
| |
| memset(readdir, 0, sizeof(*readdir)); |
| if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_verifier4(argp, &readdir->rd_verf); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval, |
| ARRAY_SIZE(readdir->rd_bmval)) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_remove(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_remove *remove = &u->remove; |
| memset(&remove->rm_cinfo, 0, sizeof(remove->rm_cinfo)); |
| return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen); |
| } |
| |
| static __be32 |
| nfsd4_decode_rename(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_rename *rename = &u->rename; |
| __be32 status; |
| |
| memset(rename, 0, sizeof(*rename)); |
| status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen); |
| if (status) |
| return status; |
| return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen); |
| } |
| |
| static __be32 |
| nfsd4_decode_renew(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| clientid_t *clientid = &u->renew; |
| return nfsd4_decode_clientid4(argp, clientid); |
| } |
| |
| static __be32 |
| nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_secinfo *secinfo = &u->secinfo; |
| secinfo->si_exp = NULL; |
| return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen); |
| } |
| |
| static __be32 |
| nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_setattr *setattr = &u->setattr; |
| __be32 status; |
| |
| memset(setattr, 0, sizeof(*setattr)); |
| status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid); |
| if (status) |
| return status; |
| return nfsd4_decode_fattr4(argp, setattr->sa_bmval, |
| ARRAY_SIZE(setattr->sa_bmval), |
| &setattr->sa_iattr, &setattr->sa_acl, |
| &setattr->sa_label, NULL); |
| } |
| |
| static __be32 |
| nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_setclientid *setclientid = &u->setclientid; |
| __be32 *p, status; |
| |
| memset(setclientid, 0, sizeof(*setclientid)); |
| |
| if (argp->minorversion >= 1) |
| return nfserr_notsupp; |
| |
| status = nfsd4_decode_verifier4(argp, &setclientid->se_verf); |
| if (status) |
| return status; |
| status = nfsd4_decode_opaque(argp, &setclientid->se_name); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len); |
| if (!p) |
| return nfserr_bad_xdr; |
| setclientid->se_callback_netid_val = svcxdr_savemem(argp, p, |
| setclientid->se_callback_netid_len); |
| if (!setclientid->se_callback_netid_val) |
| return nfserr_jukebox; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len); |
| if (!p) |
| return nfserr_bad_xdr; |
| setclientid->se_callback_addr_val = svcxdr_savemem(argp, p, |
| setclientid->se_callback_addr_len); |
| if (!setclientid->se_callback_addr_val) |
| return nfserr_jukebox; |
| if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_setclientid_confirm *scd_c = &u->setclientid_confirm; |
| __be32 status; |
| |
| if (argp->minorversion >= 1) |
| return nfserr_notsupp; |
| |
| status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid); |
| if (status) |
| return status; |
| return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm); |
| } |
| |
| /* Also used for NVERIFY */ |
| static __be32 |
| nfsd4_decode_verify(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_verify *verify = &u->verify; |
| __be32 *p, status; |
| |
| memset(verify, 0, sizeof(*verify)); |
| |
| status = nfsd4_decode_bitmap4(argp, verify->ve_bmval, |
| ARRAY_SIZE(verify->ve_bmval)); |
| if (status) |
| return status; |
| |
| /* For convenience's sake, we compare raw xdr'd attributes in |
| * nfsd4_proc_verify */ |
| |
| if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, verify->ve_attrlen); |
| if (!p) |
| return nfserr_bad_xdr; |
| verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen); |
| if (!verify->ve_attrval) |
| return nfserr_jukebox; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_write(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_write *write = &u->write; |
| __be32 status; |
| |
| status = nfsd4_decode_stateid4(argp, &write->wr_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0) |
| return nfserr_bad_xdr; |
| if (write->wr_stable_how > NFS_FILE_SYNC) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0) |
| return nfserr_bad_xdr; |
| if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen)) |
| return nfserr_bad_xdr; |
| |
| write->wr_bytes_written = 0; |
| write->wr_how_written = 0; |
| memset(&write->wr_verifier, 0, sizeof(write->wr_verifier)); |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_release_lockowner *rlockowner = &u->release_lockowner; |
| __be32 status; |
| |
| if (argp->minorversion >= 1) |
| return nfserr_notsupp; |
| |
| status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid, |
| &rlockowner->rl_owner); |
| if (status) |
| return status; |
| |
| if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid)) |
| return nfserr_inval; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_backchannel_ctl *bc = &u->backchannel_ctl; |
| memset(bc, 0, sizeof(*bc)); |
| if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec); |
| } |
| |
| static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session; |
| u32 use_conn_in_rdma_mode; |
| __be32 status; |
| |
| memset(bcts, 0, sizeof(*bcts)); |
| status = nfsd4_decode_sessionid4(argp, &bcts->sessionid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp, |
| struct nfsd4_exchange_id *exid) |
| { |
| __be32 status; |
| |
| status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce, |
| ARRAY_SIZE(exid->spo_must_enforce)); |
| if (status) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow, |
| ARRAY_SIZE(exid->spo_must_allow)); |
| if (status) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| /* |
| * This implementation currently does not support SP4_SSV. |
| * This decoder simply skips over these arguments. |
| */ |
| static noinline __be32 |
| nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp, |
| struct nfsd4_exchange_id *exid) |
| { |
| u32 count, window, num_gss_handles; |
| __be32 status; |
| |
| /* ssp_ops */ |
| status = nfsd4_decode_state_protect_ops(argp, exid); |
| if (status) |
| return status; |
| |
| /* ssp_hash_algs<> */ |
| if (xdr_stream_decode_u32(argp->xdr, &count) < 0) |
| return nfserr_bad_xdr; |
| while (count--) { |
| status = nfsd4_decode_ignored_string(argp, 0); |
| if (status) |
| return status; |
| } |
| |
| /* ssp_encr_algs<> */ |
| if (xdr_stream_decode_u32(argp->xdr, &count) < 0) |
| return nfserr_bad_xdr; |
| while (count--) { |
| status = nfsd4_decode_ignored_string(argp, 0); |
| if (status) |
| return status; |
| } |
| |
| if (xdr_stream_decode_u32(argp->xdr, &window) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp, |
| struct nfsd4_exchange_id *exid) |
| { |
| __be32 status; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0) |
| return nfserr_bad_xdr; |
| switch (exid->spa_how) { |
| case SP4_NONE: |
| break; |
| case SP4_MACH_CRED: |
| status = nfsd4_decode_state_protect_ops(argp, exid); |
| if (status) |
| return status; |
| break; |
| case SP4_SSV: |
| status = nfsd4_decode_ssv_sp_parms(argp, exid); |
| if (status) |
| return status; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_exchange_id *exid) |
| { |
| __be32 status; |
| u32 count; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &count) < 0) |
| return nfserr_bad_xdr; |
| switch (count) { |
| case 0: |
| break; |
| case 1: |
| /* Note that RFC 8881 places no length limit on |
| * nii_domain, but this implementation permits no |
| * more than NFS4_OPAQUE_LIMIT bytes */ |
| status = nfsd4_decode_opaque(argp, &exid->nii_domain); |
| if (status) |
| return status; |
| /* Note that RFC 8881 places no length limit on |
| * nii_name, but this implementation permits no |
| * more than NFS4_OPAQUE_LIMIT bytes */ |
| status = nfsd4_decode_opaque(argp, &exid->nii_name); |
| if (status) |
| return status; |
| status = nfsd4_decode_nfstime4(argp, &exid->nii_time); |
| if (status) |
| return status; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_exchange_id *exid = &u->exchange_id; |
| __be32 status; |
| |
| memset(exid, 0, sizeof(*exid)); |
| status = nfsd4_decode_verifier4(argp, &exid->verifier); |
| if (status) |
| return status; |
| status = nfsd4_decode_opaque(argp, &exid->clname); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_state_protect4_a(argp, exid); |
| if (status) |
| return status; |
| return nfsd4_decode_nfs_impl_id4(argp, exid); |
| } |
| |
| static __be32 |
| nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp, |
| struct nfsd4_channel_attrs *ca) |
| { |
| __be32 *p; |
| |
| p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7); |
| if (!p) |
| return nfserr_bad_xdr; |
| |
| /* headerpadsz is ignored */ |
| p++; |
| ca->maxreq_sz = be32_to_cpup(p++); |
| ca->maxresp_sz = be32_to_cpup(p++); |
| ca->maxresp_cached = be32_to_cpup(p++); |
| ca->maxops = be32_to_cpup(p++); |
| ca->maxreqs = be32_to_cpup(p++); |
| ca->nr_rdma_attrs = be32_to_cpup(p); |
| switch (ca->nr_rdma_attrs) { |
| case 0: |
| break; |
| case 1: |
| if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0) |
| return nfserr_bad_xdr; |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_create_session(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_create_session *sess = &u->create_session; |
| __be32 status; |
| |
| memset(sess, 0, sizeof(*sess)); |
| status = nfsd4_decode_clientid4(argp, &sess->clientid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel); |
| if (status) |
| return status; |
| status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_cb_sec(argp, &sess->cb_sec); |
| } |
| |
| static __be32 |
| nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_destroy_session *destroy_session = &u->destroy_session; |
| return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid); |
| } |
| |
| static __be32 |
| nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_free_stateid *free_stateid = &u->free_stateid; |
| return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid); |
| } |
| |
| static __be32 |
| nfsd4_decode_get_dir_delegation(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_get_dir_delegation *gdd = &u->get_dir_delegation; |
| __be32 status; |
| |
| memset(gdd, 0, sizeof(*gdd)); |
| |
| if (xdr_stream_decode_bool(argp->xdr, &gdd->gdda_signal_deleg_avail) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_bitmap4(argp, gdd->gdda_notification_types, |
| ARRAY_SIZE(gdd->gdda_notification_types)); |
| if (status) |
| return status; |
| status = nfsd4_decode_nfstime4(argp, &gdd->gdda_child_attr_delay); |
| if (status) |
| return status; |
| status = nfsd4_decode_nfstime4(argp, &gdd->gdda_dir_attr_delay); |
| if (status) |
| return status; |
| status = nfsd4_decode_bitmap4(argp, gdd->gdda_child_attributes, |
| ARRAY_SIZE(gdd->gdda_child_attributes)); |
| if (status) |
| return status; |
| return nfsd4_decode_bitmap4(argp, gdd->gdda_dir_attributes, |
| ARRAY_SIZE(gdd->gdda_dir_attributes)); |
| } |
| |
| #ifdef CONFIG_NFSD_PNFS |
| static __be32 |
| nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo; |
| __be32 status; |
| |
| memset(gdev, 0, sizeof(*gdev)); |
| status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_uint32_array(argp->xdr, |
| &gdev->gd_notify_types, 1) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_layoutcommit *lcp = &u->layoutcommit; |
| __be32 *p, status; |
| |
| memset(lcp, 0, sizeof(*lcp)); |
| if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_stateid4(argp, &lcp->lc_sid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0) |
| return nfserr_bad_xdr; |
| if (lcp->lc_newoffset) { |
| if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0) |
| return nfserr_bad_xdr; |
| } else |
| lcp->lc_last_wr = 0; |
| p = xdr_inline_decode(argp->xdr, XDR_UNIT); |
| if (!p) |
| return nfserr_bad_xdr; |
| if (xdr_item_is_present(p)) { |
| status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime); |
| if (status) |
| return status; |
| } else { |
| lcp->lc_mtime.tv_nsec = UTIME_NOW; |
| } |
| return nfsd4_decode_layoutupdate4(argp, lcp); |
| } |
| |
| static __be32 |
| nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_layoutget *lgp = &u->layoutget; |
| __be32 status; |
| |
| memset(lgp, 0, sizeof(*lgp)); |
| if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0) |
| return nfserr_bad_xdr; |
| status = nfsd4_decode_stateid4(argp, &lgp->lg_sid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_layoutreturn *lrp = &u->layoutreturn; |
| memset(lrp, 0, sizeof(*lrp)); |
| if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0) |
| return nfserr_bad_xdr; |
| return nfsd4_decode_layoutreturn4(argp, lrp); |
| } |
| #endif /* CONFIG_NFSD_PNFS */ |
| |
| static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_secinfo_no_name *sin = &u->secinfo_no_name; |
| if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0) |
| return nfserr_bad_xdr; |
| |
| sin->sin_exp = NULL; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_sequence(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_sequence *seq = &u->sequence; |
| __be32 *p, status; |
| |
| status = nfsd4_decode_sessionid4(argp, &seq->sessionid); |
| if (status) |
| return status; |
| p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4); |
| if (!p) |
| return nfserr_bad_xdr; |
| seq->seqid = be32_to_cpup(p++); |
| seq->slotid = be32_to_cpup(p++); |
| seq->maxslots = be32_to_cpup(p++); |
| seq->cachethis = be32_to_cpup(p); |
| |
| seq->status_flags = 0; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_test_stateid *test_stateid = &u->test_stateid; |
| struct nfsd4_test_stateid_id *stateid; |
| __be32 status; |
| u32 i; |
| |
| memset(test_stateid, 0, sizeof(*test_stateid)); |
| if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0) |
| return nfserr_bad_xdr; |
| |
| INIT_LIST_HEAD(&test_stateid->ts_stateid_list); |
| for (i = 0; i < test_stateid->ts_num_ids; i++) { |
| stateid = svcxdr_tmpalloc(argp, sizeof(*stateid)); |
| if (!stateid) |
| return nfserr_jukebox; |
| INIT_LIST_HEAD(&stateid->ts_id_list); |
| list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list); |
| status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid); |
| if (status) |
| return status; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_destroy_clientid *dc = &u->destroy_clientid; |
| return nfsd4_decode_clientid4(argp, &dc->clientid); |
| } |
| |
| static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_reclaim_complete *rc = &u->reclaim_complete; |
| if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0) |
| return nfserr_bad_xdr; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_fallocate *fallocate = &u->allocate; |
| __be32 status; |
| |
| status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp, |
| struct nl4_server *ns) |
| { |
| struct nfs42_netaddr *naddr; |
| __be32 *p; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0) |
| return nfserr_bad_xdr; |
| |
| /* currently support for 1 inter-server source server */ |
| switch (ns->nl4_type) { |
| case NL4_NETADDR: |
| naddr = &ns->u.nl4_addr; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0) |
| return nfserr_bad_xdr; |
| if (naddr->netid_len > RPCBIND_MAXNETIDLEN) |
| return nfserr_bad_xdr; |
| |
| p = xdr_inline_decode(argp->xdr, naddr->netid_len); |
| if (!p) |
| return nfserr_bad_xdr; |
| memcpy(naddr->netid, p, naddr->netid_len); |
| |
| if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0) |
| return nfserr_bad_xdr; |
| if (naddr->addr_len > RPCBIND_MAXUADDRLEN) |
| return nfserr_bad_xdr; |
| |
| p = xdr_inline_decode(argp->xdr, naddr->addr_len); |
| if (!p) |
| return nfserr_bad_xdr; |
| memcpy(naddr->addr, p, naddr->addr_len); |
| break; |
| default: |
| return nfserr_bad_xdr; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_copy(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_copy *copy = &u->copy; |
| u32 consecutive, i, count, sync; |
| struct nl4_server *ns_dummy; |
| __be32 status; |
| |
| memset(copy, 0, sizeof(*copy)); |
| status = nfsd4_decode_stateid4(argp, ©->cp_src_stateid); |
| if (status) |
| return status; |
| status = nfsd4_decode_stateid4(argp, ©->cp_dst_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, ©->cp_src_pos) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, ©->cp_dst_pos) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, ©->cp_count) < 0) |
| return nfserr_bad_xdr; |
| /* ca_consecutive: we always do consecutive copies */ |
| if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_bool(argp->xdr, &sync) < 0) |
| return nfserr_bad_xdr; |
| nfsd4_copy_set_sync(copy, sync); |
| |
| if (xdr_stream_decode_u32(argp->xdr, &count) < 0) |
| return nfserr_bad_xdr; |
| copy->cp_src = svcxdr_tmpalloc(argp, sizeof(*copy->cp_src)); |
| if (copy->cp_src == NULL) |
| return nfserr_jukebox; |
| if (count == 0) { /* intra-server copy */ |
| __set_bit(NFSD4_COPY_F_INTRA, ©->cp_flags); |
| return nfs_ok; |
| } |
| |
| /* decode all the supplied server addresses but use only the first */ |
| status = nfsd4_decode_nl4_server(argp, copy->cp_src); |
| if (status) |
| return status; |
| |
| ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL); |
| if (ns_dummy == NULL) |
| return nfserr_jukebox; |
| for (i = 0; i < count - 1; i++) { |
| status = nfsd4_decode_nl4_server(argp, ns_dummy); |
| if (status) { |
| kfree(ns_dummy); |
| return status; |
| } |
| } |
| kfree(ns_dummy); |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_copy_notify *cn = &u->copy_notify; |
| __be32 status; |
| |
| memset(cn, 0, sizeof(*cn)); |
| cn->cpn_src = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_src)); |
| if (cn->cpn_src == NULL) |
| return nfserr_jukebox; |
| cn->cpn_dst = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_dst)); |
| if (cn->cpn_dst == NULL) |
| return nfserr_jukebox; |
| |
| status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid); |
| if (status) |
| return status; |
| return nfsd4_decode_nl4_server(argp, cn->cpn_dst); |
| } |
| |
| static __be32 |
| nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_offload_status *os = &u->offload_status; |
| os->count = 0; |
| os->status = 0; |
| return nfsd4_decode_stateid4(argp, &os->stateid); |
| } |
| |
| static __be32 |
| nfsd4_decode_seek(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_seek *seek = &u->seek; |
| __be32 status; |
| |
| status = nfsd4_decode_stateid4(argp, &seek->seek_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0) |
| return nfserr_bad_xdr; |
| |
| seek->seek_eof = 0; |
| seek->seek_pos = 0; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_clone(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) |
| { |
| struct nfsd4_clone *clone = &u->clone; |
| __be32 status; |
| |
| status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid); |
| if (status) |
| return status; |
| status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid); |
| if (status) |
| return status; |
| if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0) |
| return nfserr_bad_xdr; |
| if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0) |
| return nfserr_bad_xdr; |
| |
| return nfs_ok; |
| } |
| |
| /* |
| * XDR data that is more than PAGE_SIZE in size is normally part of a |
| * read or write. However, the size of extended attributes is limited |
| * by the maximum request size, and then further limited by the underlying |
| * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX |
| * is 64k). Since there is no kvec- or page-based interface to xattrs, |
| * and we're not dealing with contiguous pages, we need to do some copying. |
| */ |
| |
| /* |
| * Decode data into buffer. |
| */ |
| static __be32 |
| nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr, |
| char **bufp, size_t buflen) |
| { |
| struct page **pages = xdr->pages; |
| struct kvec *head = xdr->head; |
| char *tmp, *dp; |
| u32 len; |
| |
| if (buflen <= head->iov_len) { |
| /* |
| * We're in luck, the head has enough space. Just return |
| * the head, no need for copying. |
| */ |
| *bufp = head->iov_base; |
| return 0; |
| } |
| |
| tmp = svcxdr_tmpalloc(argp, buflen); |
| if (tmp == NULL) |
| return nfserr_jukebox; |
| |
| dp = tmp; |
| memcpy(dp, head->iov_base, head->iov_len); |
| buflen -= head->iov_len; |
| dp += head->iov_len; |
| |
| while (buflen > 0) { |
| len = min_t(u32, buflen, PAGE_SIZE); |
| memcpy(dp, page_address(*pages), len); |
| |
| buflen -= len; |
| dp += len; |
| pages++; |
| } |
| |
| *bufp = tmp; |
| return 0; |
| } |
| |
| /* |
| * Get a user extended attribute name from the XDR buffer. |
| * It will not have the "user." prefix, so prepend it. |
| * Lastly, check for nul characters in the name. |
| */ |
| static __be32 |
| nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep) |
| { |
| char *name, *sp, *dp; |
| u32 namelen, cnt; |
| __be32 *p; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0) |
| return nfserr_bad_xdr; |
| if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN)) |
| return nfserr_nametoolong; |
| if (namelen == 0) |
| return nfserr_bad_xdr; |
| p = xdr_inline_decode(argp->xdr, namelen); |
| if (!p) |
| return nfserr_bad_xdr; |
| name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1); |
| if (!name) |
| return nfserr_jukebox; |
| memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); |
| |
| /* |
| * Copy the extended attribute name over while checking for 0 |
| * characters. |
| */ |
| sp = (char *)p; |
| dp = name + XATTR_USER_PREFIX_LEN; |
| cnt = namelen; |
| |
| while (cnt-- > 0) { |
| if (*sp == '\0') |
| return nfserr_bad_xdr; |
| *dp++ = *sp++; |
| } |
| *dp = '\0'; |
| |
| *namep = name; |
| |
| return nfs_ok; |
| } |
| |
| /* |
| * A GETXATTR op request comes without a length specifier. We just set the |
| * maximum length for the reply based on XATTR_SIZE_MAX and the maximum |
| * channel reply size. nfsd_getxattr will probe the length of the xattr, |
| * check it against getxa_len, and allocate + return the value. |
| */ |
| static __be32 |
| nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_getxattr *getxattr = &u->getxattr; |
| __be32 status; |
| u32 maxcount; |
| |
| memset(getxattr, 0, sizeof(*getxattr)); |
| status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name); |
| if (status) |
| return status; |
| |
| maxcount = svc_max_payload(argp->rqstp); |
| maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); |
| |
| getxattr->getxa_len = maxcount; |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_setxattr *setxattr = &u->setxattr; |
| u32 flags, maxcount, size; |
| __be32 status; |
| |
| memset(setxattr, 0, sizeof(*setxattr)); |
| |
| if (xdr_stream_decode_u32(argp->xdr, &flags) < 0) |
| return nfserr_bad_xdr; |
| |
| if (flags > SETXATTR4_REPLACE) |
| return nfserr_inval; |
| setxattr->setxa_flags = flags; |
| |
| status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name); |
| if (status) |
| return status; |
| |
| maxcount = svc_max_payload(argp->rqstp); |
| maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); |
| |
| if (xdr_stream_decode_u32(argp->xdr, &size) < 0) |
| return nfserr_bad_xdr; |
| if (size > maxcount) |
| return nfserr_xattr2big; |
| |
| setxattr->setxa_len = size; |
| if (size > 0) { |
| struct xdr_buf payload; |
| |
| if (!xdr_stream_subsegment(argp->xdr, &payload, size)) |
| return nfserr_bad_xdr; |
| status = nfsd4_vbuf_from_vector(argp, &payload, |
| &setxattr->setxa_buf, size); |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_listxattrs *listxattrs = &u->listxattrs; |
| u32 maxcount; |
| |
| memset(listxattrs, 0, sizeof(*listxattrs)); |
| |
| if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0) |
| return nfserr_bad_xdr; |
| |
| /* |
| * If the cookie is too large to have even one user.x attribute |
| * plus trailing '\0' left in a maximum size buffer, it's invalid. |
| */ |
| if (listxattrs->lsxa_cookie >= |
| (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2))) |
| return nfserr_badcookie; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0) |
| return nfserr_bad_xdr; |
| if (maxcount < 8) |
| /* Always need at least 2 words (length and one character) */ |
| return nfserr_inval; |
| |
| maxcount = min(maxcount, svc_max_payload(argp->rqstp)); |
| listxattrs->lsxa_maxcount = maxcount; |
| |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp, |
| union nfsd4_op_u *u) |
| { |
| struct nfsd4_removexattr *removexattr = &u->removexattr; |
| memset(removexattr, 0, sizeof(*removexattr)); |
| return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name); |
| } |
| |
| static __be32 |
| nfsd4_decode_noop(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p) |
| { |
| return nfs_ok; |
| } |
| |
| static __be32 |
| nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p) |
| { |
| return nfserr_notsupp; |
| } |
| |
| typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u); |
| |
| static const nfsd4_dec nfsd4_dec_ops[] = { |
| [OP_ACCESS] = nfsd4_decode_access, |
| [OP_CLOSE] = nfsd4_decode_close, |
| [OP_COMMIT] = nfsd4_decode_commit, |
| [OP_CREATE] = nfsd4_decode_create, |
| [OP_DELEGPURGE] = nfsd4_decode_notsupp, |
| [OP_DELEGRETURN] = nfsd4_decode_delegreturn, |
| [OP_GETATTR] = nfsd4_decode_getattr, |
| [OP_GETFH] = nfsd4_decode_noop, |
| [OP_LINK] = nfsd4_decode_link, |
| [OP_LOCK] = nfsd4_decode_lock, |
| [OP_LOCKT] = nfsd4_decode_lockt, |
| [OP_LOCKU] = nfsd4_decode_locku, |
| [OP_LOOKUP] = nfsd4_decode_lookup, |
| [OP_LOOKUPP] = nfsd4_decode_noop, |
| [OP_NVERIFY] = nfsd4_decode_verify, |
| [OP_OPEN] = nfsd4_decode_open, |
| [OP_OPENATTR] = nfsd4_decode_notsupp, |
| [OP_OPEN_CONFIRM] = nfsd4_decode_open_confirm, |
| [OP_OPEN_DOWNGRADE] = nfsd4_decode_open_downgrade, |
| [OP_PUTFH] = nfsd4_decode_putfh, |
| [OP_PUTPUBFH] = nfsd4_decode_noop, |
| [OP_PUTROOTFH] = nfsd4_decode_noop, |
| [OP_READ] = nfsd4_decode_read, |
| [OP_READDIR] = nfsd4_decode_readdir, |
| [OP_READLINK] = nfsd4_decode_noop, |
| [OP_REMOVE] = nfsd4_decode_remove, |
| [OP_RENAME] = nfsd4_decode_rename, |
| [OP_RENEW] = nfsd4_decode_renew, |
| [OP_RESTOREFH] = nfsd4_decode_noop, |
| [OP_SAVEFH] = nfsd4_decode_noop, |
| [OP_SECINFO] = nfsd4_decode_secinfo, |
| [OP_SETATTR] = nfsd4_decode_setattr, |
| [OP_SETCLIENTID] = nfsd4_decode_setclientid, |
| [OP_SETCLIENTID_CONFIRM] = nfsd4_decode_setclientid_confirm, |
| [OP_VERIFY] = nfsd4_decode_verify, |
| [OP_WRITE] = nfsd4_decode_write, |
| [OP_RELEASE_LOCKOWNER] = nfsd4_decode_release_lockowner, |
| |
| /* new operations for NFSv4.1 */ |
| [OP_BACKCHANNEL_CTL] = nfsd4_decode_backchannel_ctl, |
| [OP_BIND_CONN_TO_SESSION] = nfsd4_decode_bind_conn_to_session, |
| [OP_EXCHANGE_ID] = nfsd4_decode_exchange_id, |
| [OP_CREATE_SESSION] = nfsd4_decode_create_session, |
| [OP_DESTROY_SESSION] = nfsd4_decode_destroy_session, |
| [OP_FREE_STATEID] = nfsd4_decode_free_stateid, |
| [OP_GET_DIR_DELEGATION] = nfsd4_decode_get_dir_delegation, |
| #ifdef CONFIG_NFSD_PNFS |
| [OP_GETDEVICEINFO] = nfsd4_decode_getdeviceinfo, |
| [OP_GETDEVICELIST] = nfsd4_decode_notsupp, |
| [OP_LAYOUTCOMMIT] = nfsd4_decode_layoutcommit, |
| [OP_LAYOUTGET] = nfsd4_decode_layoutget, |
| [OP_LAYOUTRETURN] = nfsd4_decode_layoutreturn, |
| #else |
| [OP_GETDEVICEINFO] = nfsd4_decode_notsupp, |
| [OP_GETDEVICELIST] = nfsd4_decode_notsupp, |
| [OP_LAYOUTCOMMIT] = nfsd4_decode_notsupp, |
| [OP_LAYOUTGET] = nfsd4_decode_notsupp, |
| [OP_LAYOUTRETURN] = nfsd4_decode_notsupp, |
| #endif |
| [OP_SECINFO_NO_NAME] = nfsd4_decode_secinfo_no_name, |
| [OP_SEQUENCE] = nfsd4_decode_sequence, |
| [OP_SET_SSV] = nfsd4_decode_notsupp, |
| [OP_TEST_STATEID] = nfsd4_decode_test_stateid, |
| [OP_WANT_DELEGATION] = nfsd4_decode_notsupp, |
| [OP_DESTROY_CLIENTID] = nfsd4_decode_destroy_clientid, |
| [OP_RECLAIM_COMPLETE] = nfsd4_decode_reclaim_complete, |
| |
| /* new operations for NFSv4.2 */ |
| [OP_ALLOCATE] = nfsd4_decode_fallocate, |
| [OP_COPY] = nfsd4_decode_copy, |
| [OP_COPY_NOTIFY] = nfsd4_decode_copy_notify, |
| [OP_DEALLOCATE] = nfsd4_decode_fallocate, |
| [OP_IO_ADVISE] = nfsd4_decode_notsupp, |
| [OP_LAYOUTERROR] = nfsd4_decode_notsupp, |
| [OP_LAYOUTSTATS] = nfsd4_decode_notsupp, |
| [OP_OFFLOAD_CANCEL] = nfsd4_decode_offload_status, |
| [OP_OFFLOAD_STATUS] = nfsd4_decode_offload_status, |
| [OP_READ_PLUS] = nfsd4_decode_read, |
| [OP_SEEK] = nfsd4_decode_seek, |
| [OP_WRITE_SAME] = nfsd4_decode_notsupp, |
| [OP_CLONE] = nfsd4_decode_clone, |
| /* RFC 8276 extended atributes operations */ |
| [OP_GETXATTR] = nfsd4_decode_getxattr, |
| [OP_SETXATTR] = nfsd4_decode_setxattr, |
| [OP_LISTXATTRS] = nfsd4_decode_listxattrs, |
| [OP_REMOVEXATTR] = nfsd4_decode_removexattr, |
| }; |
| |
| static inline bool |
| nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op) |
| { |
| if (op->opnum < FIRST_NFS4_OP) |
| return false; |
| else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP) |
| return false; |
| else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP) |
| return false; |
| else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP) |
| return false; |
| return true; |
| } |
| |
| static bool |
| nfsd4_decode_compound(struct nfsd4_compoundargs *argp) |
| { |
| struct nfsd4_op *op; |
| bool cachethis = false; |
| int auth_slack= argp->rqstp->rq_auth_slack; |
| int max_reply = auth_slack + 8; /* opcnt, status */ |
| int readcount = 0; |
| int readbytes = 0; |
| __be32 *p; |
| int i; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0) |
| return false; |
| max_reply += XDR_UNIT; |
| argp->tag = NULL; |
| if (unlikely(argp->taglen)) { |
| if (argp->taglen > NFSD4_MAX_TAGLEN) |
| return false; |
| p = xdr_inline_decode(argp->xdr, argp->taglen); |
| if (!p) |
| return false; |
| argp->tag = svcxdr_savemem(argp, p, argp->taglen); |
| if (!argp->tag) |
| return false; |
| max_reply += xdr_align_size(argp->taglen); |
| } |
| |
| if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0) |
| return false; |
| if (xdr_stream_decode_u32(argp->xdr, &argp->client_opcnt) < 0) |
| return false; |
| argp->opcnt = min_t(u32, argp->client_opcnt, |
| NFSD_MAX_OPS_PER_COMPOUND); |
| |
| if (argp->opcnt > ARRAY_SIZE(argp->iops)) { |
| argp->ops = vcalloc(argp->opcnt, sizeof(*argp->ops)); |
| if (!argp->ops) { |
| argp->ops = argp->iops; |
| return false; |
| } |
| } |
| |
| if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION) |
| argp->opcnt = 0; |
| |
| for (i = 0; i < argp->opcnt; i++) { |
| op = &argp->ops[i]; |
| op->replay = NULL; |
| op->opdesc = NULL; |
| |
| if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0) |
| return false; |
| if (nfsd4_opnum_in_range(argp, op)) { |
| op->opdesc = OPDESC(op); |
| op->status = nfsd4_dec_ops[op->opnum](argp, &op->u); |
| if (op->status != nfs_ok) |
| trace_nfsd_compound_decode_err(argp->rqstp, |
| argp->opcnt, i, |
| op->opnum, |
| op->status); |
| } else { |
| op->opnum = OP_ILLEGAL; |
| op->status = nfserr_op_illegal; |
| } |
| |
| /* |
| * We'll try to cache the result in the DRC if any one |
| * op in the compound wants to be cached: |
| */ |
| cachethis |= nfsd4_cache_this_op(op); |
| |
| if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) { |
| readcount++; |
| readbytes += nfsd4_max_reply(argp->rqstp, op); |
| } else |
| max_reply += nfsd4_max_reply(argp->rqstp, op); |
| /* |
| * OP_LOCK and OP_LOCKT may return a conflicting lock. |
| * (Special case because it will just skip encoding this |
| * if it runs out of xdr buffer space, and it is the only |
| * operation that behaves this way.) |
| */ |
| if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT) |
| max_reply += NFS4_OPAQUE_LIMIT; |
| |
| if (op->status) { |
| argp->opcnt = i+1; |
| break; |
| } |
| } |
| /* Sessions make the DRC unnecessary: */ |
| if (argp->minorversion) |
| cachethis = false; |
| svc_reserve(argp->rqstp, max_reply + readbytes); |
| argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE; |
| |
| argp->splice_ok = nfsd_read_splice_ok(argp->rqstp); |
| if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack) |
| argp->splice_ok = false; |
| |
| return true; |
| } |
| |
| static __be32 nfsd4_encode_nfs_fh4(struct xdr_stream *xdr, |
| struct knfsd_fh *fh_handle) |
| { |
| return nfsd4_encode_opaque(xdr, fh_handle->fh_raw, fh_handle->fh_size); |
| } |
| |
| /* This is a frequently-encoded type; open-coded for speed */ |
| static __be32 nfsd4_encode_nfstime4(struct xdr_stream *xdr, |
| const struct timespec64 *tv) |
| { |
| __be32 *p; |
| |
| p = xdr_reserve_space(xdr, XDR_UNIT * 3); |
| if (!p) |
| return nfserr_resource; |
| p = xdr_encode_hyper(p, tv->tv_sec); |
| *p = cpu_to_be32(tv->tv_nsec); |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_encode_specdata4(struct xdr_stream *xdr, |
| unsigned int major, unsigned int minor) |
| { |
| __be32 status; |
| |
| status = nfsd4_encode_uint32_t(xdr, major); |
| if (status != nfs_ok) |
| return status; |
| return nfsd4_encode_uint32_t(xdr, minor); |
| } |
| |
| static __be32 |
| nfsd4_encode_change_info4(struct xdr_stream *xdr, const struct nfsd4_change_info *c) |
| { |
| __be32 status; |
| |
| status = nfsd4_encode_bool(xdr, c->atomic); |
| if (status != nfs_ok) |
| return status; |
| status = nfsd4_encode_changeid4(xdr, c->before_change); |
| if (status != nfs_ok) |
| return status; |
| return nfsd4_encode_changeid4(xdr, c->after_change); |
| } |
| |
| static __be32 nfsd4_encode_netaddr4(struct xdr_stream *xdr, |
| const struct nfs42_netaddr *addr) |
| { |
| __be32 status; |
| |
| /* na_r_netid */ |
| status = nfsd4_encode_opaque(xdr, addr->netid, addr->netid_len); |
| if (status != nfs_ok) |
| return status; |
| /* na_r_addr */ |
| return nfsd4_encode_opaque(xdr, addr->addr, addr->addr_len); |
| } |
| |
| /* Encode as an array of strings the string given with components |
| * separated @sep, escaped with esc_enter and esc_exit. |
| */ |
| static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep, |
| char *components, char esc_enter, |
| char esc_exit) |
| { |
| __be32 *p; |
| __be32 pathlen; |
| int pathlen_offset; |
| int strlen, count=0; |
| char *str, *end, *next; |
| |
| dprintk("nfsd4_encode_components(%s)\n", components); |
| |
| pathlen_offset = xdr->buf->len; |
| p = xdr_reserve_space(xdr, 4); |
| if (!p) |
| return nfserr_resource; |
| p++; /* We will fill this in with @count later */ |
| |
| end = str = components; |
| while (*end) { |
| bool found_esc = false; |
| |
| /* try to parse as esc_start, ..., esc_end, sep */ |
| if (*str == esc_enter) { |
| for (; *end && (*end != esc_exit); end++) |
| /* find esc_exit or end of string */; |
| next = end + 1; |
| if (*end && (!*next || *next == sep)) { |
| str++; |
| found_esc = true; |
| } |
| } |
| |
| if (!found_esc) |
| for (; *end && (*end != sep); end++) |
| /* find sep or end of string */; |
| |
| strlen = end - str; |
| if (strlen) { |
| if (xdr_stream_encode_opaque(xdr, str, strlen) < 0) |
| return nfserr_resource; |
| count++; |
| } else |
| end++; |
| if (found_esc) |
| end = next; |
| |
| str = end; |
| } |
| pathlen = htonl(count); |
| write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4); |
| return 0; |
| } |
| |
| /* Encode as an array of strings the string given with components |
| * separated @sep. |
| */ |
| static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep, |
| char *components) |
| { |
| return nfsd4_encode_components_esc(xdr, sep, components, 0, 0); |
| } |
| |
| static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr, |
| struct nfsd4_fs_location *location) |
| { |
| __be32 status; |
| |
| status = nfsd4_encode_components_esc(xdr, ':', location->hosts, |
| '[', ']'); |
| if (status) |
| return status; |
| status = nfsd4_encode_components(xdr, '/', location->path); |
| if (status) |
| return status; |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_encode_pathname4(struct xdr_stream *xdr, |
| const struct path *root, |
| const struct path *path) |
| { |
| struct path cur = *path; |
| struct dentry **components = NULL; |
| unsigned int ncomponents = 0; |
| __be32 err = nfserr_jukebox; |
| |
| dprintk("nfsd4_encode_components("); |
| |
| path_get(&cur); |
| /* First walk the path up to the nfsd root, and store the |
| * dentries/path components in an array. |
| */ |
| for (;;) { |
| if (path_equal(&cur, root)) |
| break; |
| if (cur.dentry == cur.mnt->mnt_root) { |
| if (follow_up(&cur)) |
| continue; |
| goto out_free; |
| } |
| if ((ncomponents & 15) == 0) { |
| struct dentry **new; |
| new = krealloc(components, |
| sizeof(*new) * (ncomponents + 16), |
| GFP_KERNEL); |
| if (!new) |
| goto out_free; |
| components = new; |
| } |
| components[ncomponents++] = cur.dentry; |
| cur.dentry = dget_parent(cur.dentry); |
| } |
| |
| err = nfserr_resource; |
| if (xdr_stream_encode_u32(xdr, ncomponents) != XDR_UNIT) |
| goto out_free; |
| while (ncomponents) { |
| struct dentry *dentry = components[ncomponents - 1]; |
| |
| spin_lock(&dentry->d_lock); |
| if (xdr_stream_encode_opaque(xdr, dentry->d_name.name, |
| dentry->d_name.len) < 0) { |
| spin_unlock(&dentry->d_lock); |
| goto out_free; |
| } |
| dprintk("/%pd", dentry); |
| spin_unlock(&dentry->d_lock); |
| dput(dentry); |
| ncomponents--; |
| } |
| |
| err = 0; |
| out_free: |
| dprintk(")\n"); |
| while (ncomponents) |
| dput(components[--ncomponents]); |
| kfree(components); |
| path_put(&cur); |
| return err; |
| } |
| |
| static __be32 nfsd4_encode_fs_locations4(struct xdr_stream *xdr, |
| struct svc_rqst *rqstp, |
| struct svc_export *exp) |
| { |
| struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs; |
| struct svc_export *exp_ps; |
| unsigned int i; |
| __be32 status; |
| |
| /* fs_root */ |
| exp_ps = rqst_find_fsidzero_export(rqstp); |
| if (IS_ERR(exp_ps)) |
| return nfserrno(PTR_ERR(exp_ps)); |
| status = nfsd4_encode_pathname4(xdr, &exp_ps->ex_path, &exp->ex_path); |
| exp_put(exp_ps); |
| if (status != nfs_ok) |
| return status; |
| |
| /* locations<> */ |
| if (xdr_stream_encode_u32(xdr, fslocs->locations_count) != XDR_UNIT) |
| return nfserr_resource; |
| for (i = 0; i < fslocs->locations_count; i++) { |
| status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]); |
| if (status != nfs_ok) |
| return status; |
| } |
| |
| return nfs_ok; |
| } |
| |
| static __be32 nfsd4_encode_nfsace4(struct xdr_stream *xdr, struct svc_rqst *rqstp, |
| struct nfs4_ace *ace) |
| { |
| __be32 status; |
| |
| /* type */ |
| status = nfsd4_encode_acetype4(xdr, ace->type); |
| if (status != nfs_ok) |
| return nfserr_resource; |
| /* flag */ |
| status = nfsd4_encode_aceflag4(xdr, ace->flag); |
| if (status != nfs_ok) |
| return nfserr_resource; |
| /* access mask */ |
| status = nfsd4_encode_acemask4(xdr, ace->access_mask & NFS4_ACE_MASK_ALL); |
| if (status != nfs_ok) |
| return nfserr_resource; |
| /* who */ |
| if (ace->whotype != NFS4_ACL_WHO_NAMED) |
| return nfs4_acl_write_who(xdr, ace->whotype); |
| if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) |
| return nfsd4_encode_group(xdr, rqstp, ace->who_gid); |
| return nfsd4_encode_user(xdr, rqstp, ace->who_uid); |
| } |
| |
| #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \ |
| FATTR4_WORD0_RDATTR_ERROR) |
| #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID |
| #define WORD2_ABSENT_FS_ATTRS 0 |
| |
| #ifdef CONFIG_NFSD_V4_SECURITY_LABEL |
| static inline __be32 |
| nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, |
| void *context, int len) |
| { |
| __be32 *p; |
| |
| p = xdr_reserve_space(xdr, len + 4 + 4 + 4); |
| if (!p) |
| return nfserr_resource; |
| |
| /* |
| * For now we use a 0 here to indicate the null translation; in |
| * the future we may place a call to translation code here. |
| */ |
| *p++ = cpu_to_be32(0); /* lfs */ |
| *p++ = cpu_to_be32(0); /* pi */ |
| p = xdr_encode_opaque(p, context, len); |
| return 0; |
| } |
| #else |
| static inline __be32 |
| nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, |
| void *context, int len) |
| { return 0; } |
| #endif |
| |
| static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err) |
| { |
| /* As per referral draft: */ |
| if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS || |
| *bmval1 & ~WORD1_ABSENT_FS_ATTRS) { |
| if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR || |
| *bmval0 & FATTR4_WORD0_FS_LOCATIONS) |
| *rdattr_err = NFSERR_MOVED; |
| else |
| return nfserr_moved; |
| } |
| *bmval0 &= WORD0_ABSENT_FS_ATTRS; |
| *bmval1 &= WORD1_ABSENT_FS_ATTRS; |
| *bmval2 &= WORD2_ABSENT_FS_ATTRS; |
| return 0; |
| } |
| |
| |
| static int nfsd4_get_mounted_on_ino(struct svc_export *exp, u64 *pino) |
| { |
| struct path path = exp->ex_path; |
| struct kstat stat; |
| int err; |
| |
| path_get(&path); |
| while (follow_up(&path)) { |
| if (path.dentry != path.mnt->mnt_root) |
| break; |
| } |
| err = vfs_getattr(&path, &stat, STATX_INO, AT_STATX_SYNC_AS_STAT); |
| path_put(&path); |
| if (!err) |
| *pino = stat.ino; |
| return err; |
| } |
| |
| static __be32 |
| nfsd4_encode_bitmap4(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2) |
| { |
| __be32 *p; |
| |
| if (bmval2) { |
| p = xdr_reserve_space(xdr, XDR_UNIT * 4); |
| if (!p) |
| goto out_resource; |
| *p++ = cpu_to_be32(3); |
| *p++ = cpu_to_be32(bmval0); |
| *p++ = cpu_to_be32(bmval1); |
| *p++ = cpu_to_be32(bmval2); |
| } else if (bmval1) { |
| p = xdr_reserve_space(xdr, XDR_UNIT * 3); |
| if (!p) |
| goto out_resource; |
| *p++ = cpu_to_be32(2); |
| *p++ = cpu_to_be32(bmval0); |
| *p++ = cpu_to_be32(bmval1); |
| } else { |
| p = xdr_reserve_space(xdr, XDR_UNIT * 2); |
| if (!p) |
| goto out_resource; |
| *p++ = cpu_to_be32(1); |
| *p++ = cpu_to_be32(bmval0); |
| } |
| |
| return nfs_ok; |
| |