Received: by 2002:a05:7412:2a8c:b0:e2:908c:2ebd with SMTP id u12csp3950583rdh; Fri, 29 Sep 2023 07:09:50 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFD6Mbfj7q0xUkLiaw7xCbMu7Oh2knSPYR6bmSlN8Ypq0v4e/E7hDp7phPWZekIezCHeZnr X-Received: by 2002:a05:6a00:c89:b0:68a:3b39:a486 with SMTP id a9-20020a056a000c8900b0068a3b39a486mr4616161pfv.24.1695996589735; Fri, 29 Sep 2023 07:09:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695996589; cv=none; d=google.com; s=arc-20160816; b=vyoscsGThYL3hEs6zqTvjKdnkWRsumKNspxeqwRKS2sLB8bhnjubr4JnmQ7RqiT6Sa Zvu5Lq3VN/pUBzUNJaU6TTRi98ZnfzghhvJyl8ckaZV2wj4ywLd9CJHeShZlLUAh7fNe I7dqi7rAaxcTNSlLc4aQgXoyUnraw2nwpJzy4NdrIWbHwy6wZmMwADy8YZoLZIQpjxt1 +J+i2vqpqcp51NZoUQYB7E2eEeGkgdXQRqsVhL+PPgAfYspJG2qa4au2lnzoR6XQFEIG 7pYXra4FjLUpkhkzTLOF4yJR+iqF+PNKJ0y0lq/W5Bakfap1l/nd2DpVaOYzm8m7Zb7W UjHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:dkim-signature; bh=Af+zuv3uVy+WsI6cpqVtrY2EVD2yqFh9rk0h9v9BQxk=; fh=v8a13lpFSZWlL4AptTEJnmXnlqoWXhGCGCgvrcnCT9I=; b=PPsAWvauEdVnC7zcnTNeKlO+wIp6x0zwkQYNcDChd1WBbH0vJdeV1MLK2/zS5YWAvm cxrbX7dhWhHa3ujJJJn9msY03jidG9wcUtERjLTzmFwluygd56fin0KmPggQBVaSgzXt PCCe0e5Ss9Mea8JnW5hG/3t5uYy8UDGjozgrgujYNQAwguxt2+KlZk4xILrwDaHuJfuz 1UwK0zIs1u6/3NIZ3q94Lv3FSRzzjypvl2ZEJTRXJoZNqb4caJIy8P11hvBMfG8KfFQA wmdncHTmD0fzMotutK7f8xFNGZsmXVNb493BYqFdO84vb2Micj7ccnVI8eppdC4ksd+5 DA4Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XZ8sh3lI; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id k7-20020aa788c7000000b006933e55a66fsi7402610pff.182.2023.09.29.07.09.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 07:09:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XZ8sh3lI; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id D178280A4174; Fri, 29 Sep 2023 06:59:05 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232911AbjI2N7E (ORCPT + 99 others); Fri, 29 Sep 2023 09:59:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41306 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232954AbjI2N7D (ORCPT ); Fri, 29 Sep 2023 09:59:03 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07F711B0 for ; Fri, 29 Sep 2023 06:59:01 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 78F25C433C8; Fri, 29 Sep 2023 13:59:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1695995940; bh=yPahKrR9TAHt9lHlZNVcdj/Q6M2DJ2Hdtm+1ETErYxo=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=XZ8sh3lIa7hWThVs8jRym3snQwaCA6v+1ttM70IsgIM8KqV4lViPbQ8a3TtA6l9un JkHMBPqJ+0z6NsOreuhLaZMEiuKYO6ChNp0U/I/1CxmEVEg/84ybacf6uulSh+TXJZ lj7E+FdJcX51qt622ntN1fjTBmFnsPc6r1Q2afakevTW5bPN75AGlXqfRvXYdVsfS2 k8J7y4QPbIFFM+sBrGTsldik6kZuMZzGPfZwXDnbgFJYHEQwdGMcPxR3ilLyyzxtW9 q2woKF8jSo/nkjRYNGPQqs5SudQwk7sx3Yl6gY5w0KjkDAUZji6Ll9jHlApz4Azb2F ZN/mEw89dh0/A== Subject: [PATCH v1 2/7] NFSD: Refactor nfsd4_encode_lock_denied() From: Chuck Lever To: linux-nfs@vger.kernel.org Cc: Chuck Lever Date: Fri, 29 Sep 2023 09:58:59 -0400 Message-ID: <169599593949.5622.9721527655525429301.stgit@manet.1015granger.net> In-Reply-To: <169599581942.5622.15965175797823365235.stgit@manet.1015granger.net> References: <169599581942.5622.15965175797823365235.stgit@manet.1015granger.net> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 29 Sep 2023 06:59:06 -0700 (PDT) From: Chuck Lever Use the modern XDR utility functions. The LOCK and LOCKT encoder functions need to return nfserr_denied when a lock is denied, but nfsd4_encode_lock4denied() should return a status code that is consistent with other XDR encoders. Signed-off-by: Chuck Lever --- fs/nfsd/nfs4xdr.c | 73 ++++++++++++++++++++++++++--------------------------- 1 file changed, 36 insertions(+), 37 deletions(-) diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c index 9f7a6924ef5f..ee8a7989f54f 100644 --- a/fs/nfsd/nfs4xdr.c +++ b/fs/nfsd/nfs4xdr.c @@ -3990,40 +3990,26 @@ nfsd4_encode_lock_owner4(struct xdr_stream *xdr, const clientid_t *clientid, return nfsd4_encode_opaque(xdr, owner->data, owner->len); } -/* -* Including all fields other than the name, a LOCK4denied structure requires -* 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes. -*/ static __be32 -nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld) +nfsd4_encode_lock4denied(struct xdr_stream *xdr, + const struct nfsd4_lock_denied *ld) { - struct xdr_netobj *conf = &ld->ld_owner; - __be32 *p, status; + __be32 status; -again: - p = xdr_reserve_space(xdr, XDR_UNIT * 5); - if (!p) { - /* - * Don't fail to return the result just because we can't - * return the conflicting open: - */ - if (conf->len) { - kfree(conf->data); - conf->len = 0; - conf->data = NULL; - goto again; - } - return nfserr_resource; - } - p = xdr_encode_hyper(p, ld->ld_start); - p = xdr_encode_hyper(p, ld->ld_length); - *p++ = cpu_to_be32(ld->ld_type); - status = nfsd4_encode_lock_owner4(xdr, &ld->ld_clientid, - &ld->ld_owner); + /* offset */ + status = nfsd4_encode_offset4(xdr, ld->ld_start); if (status != nfs_ok) return status; - - return nfserr_denied; + /* length */ + status = nfsd4_encode_length4(xdr, ld->ld_length); + if (status != nfs_ok) + return status; + /* locktype */ + if (xdr_stream_encode_u32(xdr, ld->ld_type) != XDR_UNIT) + return nfserr_resource; + /* owner */ + return nfsd4_encode_lock_owner4(xdr, &ld->ld_clientid, + &ld->ld_owner); } static __be32 @@ -4032,13 +4018,21 @@ nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, { struct nfsd4_lock *lock = &u->lock; struct xdr_stream *xdr = resp->xdr; + __be32 status; - if (!nfserr) - nfserr = nfsd4_encode_stateid4(xdr, &lock->lk_resp_stateid); - else if (nfserr == nfserr_denied) - nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied); - - return nfserr; + switch (nfserr) { + case nfs_ok: + /* resok4 */ + status = nfsd4_encode_stateid4(xdr, &lock->lk_resp_stateid); + break; + case nfserr_denied: + /* denied */ + status = nfsd4_encode_lock4denied(xdr, &lock->lk_denied); + break; + default: + return nfserr; + } + return status != nfs_ok ? status : nfserr; } static __be32 @@ -4047,9 +4041,14 @@ nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, { struct nfsd4_lockt *lockt = &u->lockt; struct xdr_stream *xdr = resp->xdr; + __be32 status; - if (nfserr == nfserr_denied) - nfsd4_encode_lock_denied(xdr, &lockt->lt_denied); + if (nfserr == nfserr_denied) { + /* denied */ + status = nfsd4_encode_lock4denied(xdr, &lockt->lt_denied); + if (status != nfs_ok) + return status; + } return nfserr; }