1. 12 Dec, 2012 3 commits
  2. 11 Dec, 2012 5 commits
    • Trond Myklebust's avatar
      NFSv4.1: Be conservative about the client highest slotid · b0ef9647
      Trond Myklebust authored
      If the server sends us a target that looks like an outlier, but
      is lower than the existing target, then respect it anyway.
      However defer actually updating the generation counter until
      we get a target that doesn't look like an outlier.
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      b0ef9647
    • Trond Myklebust's avatar
      NFSv4.1: Handle NFS4ERR_BADSLOT errors correctly · 85563073
      Trond Myklebust authored
      Most (all) NFS4ERR_BADSLOT errors are due to the client failing to
      respect the server's sr_highest_slotid limit. This mainly happens
      due to reordered RPC requests.
      The way to handle it is simply to drop the slot that we're using,
      and retry using the new highest_slotid limits.
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      85563073
    • Trond Myklebust's avatar
      7ce0171d
    • Jeff Layton's avatar
      nfs: don't extend writes to cover entire page if pagecache is invalid · 81d9bce5
      Jeff Layton authored
      Jian reported that the following sequence would leave "testfile" with
      corrupt data:
      
          # mount localhost:/export /mnt/nfs/ -o vers=3
          # echo abc > /mnt/nfs/testfile; echo def >> /export/testfile; echo ghi >> /mnt/nfs/testfile
          # cat -v /export/testfile
          abc
          ^@^@^@^@ghi
      
      While there's no locking involved here, the operations are serialized,
      so CTO should prevent corruption.
      
      The first write to the file is fine and writes 4 bytes. The file is then
      extended on the server. When it's reopened a GETATTR is issued and the
      size change is noticed. This causes NFS_INO_INVALID_DATA to be set on
      the file. Because the file is opened for write only,
      nfs_want_read_modify_write() returns 0 to nfs_write_begin().
      nfs_updatepage then calls nfs_write_pageuptodate() to see if it should
      extend the nfs_page to cover the whole page. NFS_INO_INVALID_DATA is
      still set on the file at that point, but that flag is ignored and
      nfs_pageuptodate erroneously extends the write to cover the whole page,
      with the write done on the server side filled in with zeroes.
      
      This patch just has that function check for NFS_INO_INVALID_DATA in
      addition to NFS_INO_REVAL_PAGECACHE. This fixes the bug, but looking
      over the code, I wonder if we might have a similar bug in
      nfs_revalidate_size(). The difference between those two flags is very
      subtle, so it seems like we ought to be checking for
      NFS_INO_INVALID_DATA in most of the places that we look for
      NFS_INO_REVAL_PAGECACHE.
      
      I believe this is regression introduced by commit 8d197a56. The code
      did check for NFS_INO_INVALID_DATA prior to that patch.
      
      Original bug report is here:
      
          https://bugzilla.redhat.com/show_bug.cgi?id=885743
      
      Cc: <stable@vger.kernel.org> # 3.5+
      Reported-by: default avatarJian Li <jiali@redhat.com>
      Signed-off-by: default avatarJeff Layton <jlayton@redhat.com>
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      81d9bce5
    • Sven Wegener's avatar
      NFSv4: Check for buffer length in __nfs4_get_acl_uncached · 7d3e91a8
      Sven Wegener authored
      Commit 1f1ea6c2 "NFSv4: Fix buffer overflow checking in
      __nfs4_get_acl_uncached" accidently dropped the checking for too small
      result buffer length.
      
      If someone uses getxattr on "system.nfs4_acl" on an NFSv4 mount
      supporting ACLs, the ACL has not been cached and the buffer suplied is
      too short, we still copy the complete ACL, resulting in kernel and user
      space memory corruption.
      Signed-off-by: default avatarSven Wegener <sven.wegener@stealer.net>
      Cc: stable@kernel.org
      Signed-off-by: default avatarTrond Myklebust <Trond.Myklebust@netapp.com>
      7d3e91a8
  3. 05 Dec, 2012 29 commits
  4. 26 Nov, 2012 3 commits