diff mbox series

[v2] SUNRPC: Fix READ_PLUS crasher

Message ID 165662209842.1459.4593520026847863736.stgit@klimt.1015granger.net (mailing list archive)
State New, archived
Headers show
Series [v2] SUNRPC: Fix READ_PLUS crasher | expand

Commit Message

Chuck Lever June 30, 2022, 8:48 p.m. UTC
Looks like there are still cases when "space_left - frag1bytes" can
legitimately exceed PAGE_SIZE. Ensure that xdr->end always remains
within the current encode buffer.

Reported-by: Bruce Fields <bfields@fieldses.org>
Reported-by: Zorro Lang <zlang@redhat.com>
Link: https://bugzilla.kernel.org/show_bug.cgi?id=216151
Fixes: 6c254bf3b637 ("SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer()")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
 net/sunrpc/xdr.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Comments

J. Bruce Fields July 1, 2022, 2:17 p.m. UTC | #1
This also gets through my tests without a crash.--b.

On Thu, Jun 30, 2022 at 04:48:18PM -0400, Chuck Lever wrote:
> Looks like there are still cases when "space_left - frag1bytes" can
> legitimately exceed PAGE_SIZE. Ensure that xdr->end always remains
> within the current encode buffer.
> 
> Reported-by: Bruce Fields <bfields@fieldses.org>
> Reported-by: Zorro Lang <zlang@redhat.com>
> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216151
> Fixes: 6c254bf3b637 ("SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer()")
> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
> ---
>  net/sunrpc/xdr.c |    2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/net/sunrpc/xdr.c b/net/sunrpc/xdr.c
> index f87a2d8f23a7..5d2b3e6979fb 100644
> --- a/net/sunrpc/xdr.c
> +++ b/net/sunrpc/xdr.c
> @@ -984,7 +984,7 @@ static noinline __be32 *xdr_get_next_encode_buffer(struct xdr_stream *xdr,
>  	p = page_address(*xdr->page_ptr);
>  	xdr->p = p + frag2bytes;
>  	space_left = xdr->buf->buflen - xdr->buf->len;
> -	if (space_left - nbytes >= PAGE_SIZE)
> +	if (space_left - frag1bytes >= PAGE_SIZE)
>  		xdr->end = p + PAGE_SIZE;
>  	else
>  		xdr->end = p + space_left - frag1bytes;
>
Zorro Lang July 4, 2022, 6:55 a.m. UTC | #2
On Thu, Jun 30, 2022 at 04:48:18PM -0400, Chuck Lever wrote:
> Looks like there are still cases when "space_left - frag1bytes" can
> legitimately exceed PAGE_SIZE. Ensure that xdr->end always remains
> within the current encode buffer.
> 
> Reported-by: Bruce Fields <bfields@fieldses.org>
> Reported-by: Zorro Lang <zlang@redhat.com>
> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216151
> Fixes: 6c254bf3b637 ("SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer()")
> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
> ---

I can't reproduce this bug by merging this patch:

FSTYP         -- nfs
PLATFORM      -- Linux/x86_64 ibm-xxxxx-08 5.19.0-rc4+ #1 SMP PREEMPT_DYNAMIC Sat Jul 2 09:59:50 EDT 2022
MKFS_OPTIONS  -- ibm-xxxxx-xx.xxx.xxx.xxx.xxxxxx.com:/mnt/xfstests/scratch/nfs-server
MOUNT_OPTIONS -- -o vers=4.2 -o context=system_u:object_r:root_t:s0 ibm-x3650m4-08.rhts.eng.pek2.redhat.com:/mnt/xfstests/scratch/nfs-server /mnt/xfstests/scratch/nfs-client

generic/465        12s
Ran: generic/465
Passed all 1 tests

>  net/sunrpc/xdr.c |    2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/net/sunrpc/xdr.c b/net/sunrpc/xdr.c
> index f87a2d8f23a7..5d2b3e6979fb 100644
> --- a/net/sunrpc/xdr.c
> +++ b/net/sunrpc/xdr.c
> @@ -984,7 +984,7 @@ static noinline __be32 *xdr_get_next_encode_buffer(struct xdr_stream *xdr,
>  	p = page_address(*xdr->page_ptr);
>  	xdr->p = p + frag2bytes;
>  	space_left = xdr->buf->buflen - xdr->buf->len;
> -	if (space_left - nbytes >= PAGE_SIZE)
> +	if (space_left - frag1bytes >= PAGE_SIZE)
>  		xdr->end = p + PAGE_SIZE;
>  	else
>  		xdr->end = p + space_left - frag1bytes;
> 
>
Chuck Lever July 4, 2022, 4:16 p.m. UTC | #3
> On Jul 4, 2022, at 2:55 AM, Zorro Lang <zlang@redhat.com> wrote:
> 
> On Thu, Jun 30, 2022 at 04:48:18PM -0400, Chuck Lever wrote:
>> Looks like there are still cases when "space_left - frag1bytes" can
>> legitimately exceed PAGE_SIZE. Ensure that xdr->end always remains
>> within the current encode buffer.
>> 
>> Reported-by: Bruce Fields <bfields@fieldses.org>
>> Reported-by: Zorro Lang <zlang@redhat.com>
>> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216151
>> Fixes: 6c254bf3b637 ("SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer()")
>> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
>> ---
> 
> I can't reproduce this bug by merging this patch:
> 
> FSTYP         -- nfs
> PLATFORM      -- Linux/x86_64 ibm-xxxxx-08 5.19.0-rc4+ #1 SMP PREEMPT_DYNAMIC Sat Jul 2 09:59:50 EDT 2022
> MKFS_OPTIONS  -- ibm-xxxxx-xx.xxx.xxx.xxx.xxxxxx.com:/mnt/xfstests/scratch/nfs-server
> MOUNT_OPTIONS -- -o vers=4.2 -o context=system_u:object_r:root_t:s0 ibm-x3650m4-08.rhts.eng.pek2.redhat.com:/mnt/xfstests/scratch/nfs-server /mnt/xfstests/scratch/nfs-client
> 
> generic/465        12s
> Ran: generic/465
> Passed all 1 tests

Thanks for testing!


>> net/sunrpc/xdr.c |    2 +-
>> 1 file changed, 1 insertion(+), 1 deletion(-)
>> 
>> diff --git a/net/sunrpc/xdr.c b/net/sunrpc/xdr.c
>> index f87a2d8f23a7..5d2b3e6979fb 100644
>> --- a/net/sunrpc/xdr.c
>> +++ b/net/sunrpc/xdr.c
>> @@ -984,7 +984,7 @@ static noinline __be32 *xdr_get_next_encode_buffer(struct xdr_stream *xdr,
>> 	p = page_address(*xdr->page_ptr);
>> 	xdr->p = p + frag2bytes;
>> 	space_left = xdr->buf->buflen - xdr->buf->len;
>> -	if (space_left - nbytes >= PAGE_SIZE)
>> +	if (space_left - frag1bytes >= PAGE_SIZE)
>> 		xdr->end = p + PAGE_SIZE;
>> 	else
>> 		xdr->end = p + space_left - frag1bytes;
>> 
>> 
> 

--
Chuck Lever
diff mbox series

Patch

diff --git a/net/sunrpc/xdr.c b/net/sunrpc/xdr.c
index f87a2d8f23a7..5d2b3e6979fb 100644
--- a/net/sunrpc/xdr.c
+++ b/net/sunrpc/xdr.c
@@ -984,7 +984,7 @@  static noinline __be32 *xdr_get_next_encode_buffer(struct xdr_stream *xdr,
 	p = page_address(*xdr->page_ptr);
 	xdr->p = p + frag2bytes;
 	space_left = xdr->buf->buflen - xdr->buf->len;
-	if (space_left - nbytes >= PAGE_SIZE)
+	if (space_left - frag1bytes >= PAGE_SIZE)
 		xdr->end = p + PAGE_SIZE;
 	else
 		xdr->end = p + space_left - frag1bytes;