Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp574449pxj; Thu, 3 Jun 2021 13:54:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyMTQfX98Qumd5XKz1jrzXWV2GS3SCfQ1nC/Lr/iQjvEHAsCjmRrGqbIQDWx4bjEU0McqHv X-Received: by 2002:a17:907:101c:: with SMTP id ox28mr1081511ejb.322.1622753692288; Thu, 03 Jun 2021 13:54:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622753692; cv=none; d=google.com; s=arc-20160816; b=wUfp2pH9bN1nn7TC1NwumdM7leTgc1ErL/slOlvWXP6K/iBMR93P6E/uRJof5SywJx 4AF2I8npav9zi8YVxvG6eG6k+W1rC42ujNI2t5MUyjd39bpsw6lcFKlfWIgzJL8fqKSy 1fcdIq7mf8FFekVOHXPNQEumzvWr3cZ4qW/jPrvi5UhYS+Xb9iNQclomVnSb9RKaJhXD uIFti47ev7MmFDLUzzbi19B7I8loxlO1cvXjEszZS2mrDK43BbFuglxFvrFpz8Xn/6ba h2vgkFkVHJj7pCGAFe9hQZqw84DbHdWGltgPIyR6uY0/Giz0Vvh5ESntMma2spKzG1w9 wovg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject; bh=FJJb2vi/N+046z2mThV/rrOtOENGLl1nJRbOd6Ogcp4=; b=f+5dj8bFv/hMFUWmEj9q9whUNIrgiO4cN/uxZ/PwVfwkVOzgB7aaCPF5O61H3nISbO nJRVta/tk/TAWTbqFpxdxK17gLh7JTrYQI0KADK5iL74EH6MPx9NNBLJdRT5tEXWSFF1 WKeY7w0X1+UuXtxSViroXVhVu0duE2LB+fqmVqFeHH1CpxQOLQOvBVJzsTHI7OsTIc8Y 8G5KCrsVVQeHj60avUGsh0Jx7spgC59uCJ11244AN5ZiXQ9KBs2/pWguEgsSBF0AwMrm op4i2WkzDwOk5eRdulnW1jBmThNVKPd5uX1c/NN62ciBF+ZDsXz+81GD0Ilw7zoQLxgQ Wozg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a1si2880441eje.497.2021.06.03.13.54.29; Thu, 03 Jun 2021 13:54:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229894AbhFCUyp (ORCPT + 99 others); Thu, 3 Jun 2021 16:54:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:45200 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229852AbhFCUyo (ORCPT ); Thu, 3 Jun 2021 16:54:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A26F261263; Thu, 3 Jun 2021 20:52:59 +0000 (UTC) Subject: [PATCH 24/29] lockd: Update the NLMv4 SHARE arguments decoder to use struct xdr_stream From: Chuck Lever To: bfields@fieldses.org Cc: linux-nfs@vger.kernel.org Date: Thu, 03 Jun 2021 16:52:58 -0400 Message-ID: <162275357894.32691.2924442001842580373.stgit@klimt.1015granger.net> In-Reply-To: <162275337584.32691.3943139351165347555.stgit@klimt.1015granger.net> References: <162275337584.32691.3943139351165347555.stgit@klimt.1015granger.net> User-Agent: StGit/1.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Signed-off-by: Chuck Lever --- fs/lockd/xdr4.c | 99 ++++++++++++++----------------------------------------- 1 file changed, 26 insertions(+), 73 deletions(-) diff --git a/fs/lockd/xdr4.c b/fs/lockd/xdr4.c index 2dbf82c2726b..e6bab1d1e41f 100644 --- a/fs/lockd/xdr4.c +++ b/fs/lockd/xdr4.c @@ -42,37 +42,6 @@ loff_t_to_s64(loff_t offset) return res; } -/* - * XDR functions for basic NLM types - */ -static __be32 * -nlm4_decode_cookie(__be32 *p, struct nlm_cookie *c) -{ - unsigned int len; - - len = ntohl(*p++); - - if(len==0) - { - c->len=4; - memset(c->data, 0, 4); /* hockeypux brain damage */ - } - else if(len<=NLM_MAXCOOKIELEN) - { - c->len=len; - memcpy(c->data, p, len); - p+=XDR_QUADLEN(len); - } - else - { - dprintk("lockd: bad cookie size %d (only cookies under " - "%d bytes are supported.)\n", - len, NLM_MAXCOOKIELEN); - return NULL; - } - return p; -} - static __be32 * nlm4_encode_cookie(__be32 *p, struct nlm_cookie *c) { @@ -82,20 +51,6 @@ nlm4_encode_cookie(__be32 *p, struct nlm_cookie *c) return p; } -static __be32 * -nlm4_decode_fh(__be32 *p, struct nfs_fh *f) -{ - memset(f->data, 0, sizeof(f->data)); - f->size = ntohl(*p++); - if (f->size > NFS_MAXFHSIZE) { - dprintk("lockd: bad fhandle size %d (should be <=%d)\n", - f->size, NFS_MAXFHSIZE); - return NULL; - } - memcpy(f->data, p, f->size); - return p + XDR_QUADLEN(f->size); -} - /* * NLM file handles are defined by specification to be a variable-length * XDR opaque no longer than 1024 bytes. However, this implementation @@ -122,15 +77,6 @@ svcxdr_decode_fhandle(struct xdr_stream *xdr, struct nfs_fh *fh) return true; } -/* - * Encode and decode owner handle - */ -static __be32 * -nlm4_decode_oh(__be32 *p, struct xdr_netobj *oh) -{ - return xdr_decode_netobj(p, oh); -} - static bool svcxdr_decode_lock(struct xdr_stream *xdr, struct nlm_lock *lock) { @@ -335,35 +281,42 @@ nlm4svc_decode_reboot(struct svc_rqst *rqstp, __be32 *p) return 1; } -int -nlm4svc_encode_testres(struct svc_rqst *rqstp, __be32 *p) -{ - struct nlm_res *resp = rqstp->rq_resp; - - if (!(p = nlm4_encode_testres(p, resp))) - return 0; - return xdr_ressize_check(rqstp, p); -} - int nlm4svc_decode_shareargs(struct svc_rqst *rqstp, __be32 *p) { + struct xdr_stream *xdr = &rqstp->rq_arg_stream; struct nlm_args *argp = rqstp->rq_argp; struct nlm_lock *lock = &argp->lock; memset(lock, 0, sizeof(*lock)); locks_init_lock(&lock->fl); - lock->svid = ~(u32) 0; + lock->svid = ~(u32)0; - if (!(p = nlm4_decode_cookie(p, &argp->cookie)) - || !(p = xdr_decode_string_inplace(p, &lock->caller, - &lock->len, NLM_MAXSTRLEN)) - || !(p = nlm4_decode_fh(p, &lock->fh)) - || !(p = nlm4_decode_oh(p, &lock->oh))) + if (!svcxdr_decode_cookie(xdr, &argp->cookie)) return 0; - argp->fsm_mode = ntohl(*p++); - argp->fsm_access = ntohl(*p++); - return xdr_argsize_check(rqstp, p); + if (!svcxdr_decode_string(xdr, &lock->caller, &lock->len)) + return 0; + if (!svcxdr_decode_fhandle(xdr, &lock->fh)) + return 0; + if (!svcxdr_decode_owner(xdr, &lock->oh)) + return 0; + /* XXX: Range checks are missing in the original code */ + if (xdr_stream_decode_u32(xdr, &argp->fsm_mode) < 0) + return 0; + if (xdr_stream_decode_u32(xdr, &argp->fsm_access) < 0) + return 0; + + return 1; +} + +int +nlm4svc_encode_testres(struct svc_rqst *rqstp, __be32 *p) +{ + struct nlm_res *resp = rqstp->rq_resp; + + if (!(p = nlm4_encode_testres(p, resp))) + return 0; + return xdr_ressize_check(rqstp, p); } int