Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp23657pxb; Tue, 12 Apr 2022 15:43:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyaMN/muWsWB5jJmpuTnD2+j89MJQuWiJemFXhYNwgQiFq695WyoBOp9WDTbUxyee+39bRA X-Received: by 2002:a17:903:4052:b0:155:fc0b:48fb with SMTP id n18-20020a170903405200b00155fc0b48fbmr39282069pla.27.1649803413267; Tue, 12 Apr 2022 15:43:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649803413; cv=none; d=google.com; s=arc-20160816; b=xTg6iOp8tVgGKdMJekXfoc1L8lD74m+Fz7WvxGVoQmS1EhlMMCnGMBEjmN/W2+yTxT M8ovIS47IZhVR+uQajD14qBgeXz0TEUZHPiCJ/h04Y2FTH156Rf8F2edZNG2x6itZc9z tDd2rbftlO4pFDxY/auYYYy2gZylUGbgI2ZQeDJXojGfsWmT7E98e/3AtYrfST/x3jaA ffknANawFMsdptLDqB2Hvof1D8xkNmsXIPTEIscttqCo+6qUoqxuvmPrMdteuC8pg14P hBuo5Z6reE/U9l+sRIc8+X4RJdGCLL8IchJKkk61wUVNGIu/grk+1Ivee8vHH9N9hmJL /srw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JIeXCQSYYqd37N86+UugsGxbSRbfyYFoUn3CAV4W56w=; b=D7sPH079vOQAkhTGePSa6z/Bn85csF+7V7gGMu4kg+pb2HcQh60uAKh3W+GgRXkouQ 02K/XsjWJNx67uG7AY1QO1iPVKRebWev5SbdRimcK6jggqiduq4U8c+0Ss4FOiH6tbMe lRnjaZitpdy3hd7bIZ3vuAhM8q6IAp4raL3J0oeFs+EMWiWI9+MgW1pGNM+rxs2tmsvc JSk+X/svFdFM5MaZfvPFoobYcXK9K8A1F/gMCPhw47Yryhl6Lk8p/BZCe+R3/j8wQrIF Xugye/DlqFD95LlX+40fRrnsf1tVUHGOQQ331HpZ4Q7e+f+W9eSUpaCVdGej4gwfwLP1 2IxQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tGxhb5JB; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id t18-20020a170902e85200b0015874dc3247si6294572plg.170.2022.04.12.15.43.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 15:43:33 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tGxhb5JB; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 13D201B2559; Tue, 12 Apr 2022 14:25:22 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351012AbiDLGs0 (ORCPT + 99 others); Tue, 12 Apr 2022 02:48:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44938 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351164AbiDLGoK (ORCPT ); Tue, 12 Apr 2022 02:44:10 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6A3D939802; Mon, 11 Apr 2022 23:37:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 06EA761902; Tue, 12 Apr 2022 06:37:37 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 13CA8C385A1; Tue, 12 Apr 2022 06:37:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649745456; bh=xcEbyCMsLVo/1wSb+02SohARUT3LNZTwNJ3R8A644zE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tGxhb5JBkWP2NqqzMWYxwg7THy0adsoKknfiTLWrF1wTODj8I1g48aPTsq2EA2F/H Y6RI+z7e6TqI169GbQFelhFf5KpdmSWCHo1EyPucTPygMH87Gn4/OCPje2Ubqa25Xa tWy+qM2qOk7TaiewgRTvRM8HbCNJWjtI3PXWnci8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, ChenXiaoSong , Trond Myklebust , Sasha Levin Subject: [PATCH 5.10 101/171] NFSv4: fix open failure with O_ACCMODE flag Date: Tue, 12 Apr 2022 08:29:52 +0200 Message-Id: <20220412062930.807813869@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220412062927.870347203@linuxfoundation.org> References: <20220412062927.870347203@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: ChenXiaoSong [ Upstream commit b243874f6f9568b2daf1a00e9222cacdc15e159c ] open() with O_ACCMODE|O_DIRECT flags secondly will fail. Reproducer: 1. mount -t nfs -o vers=4.2 $server_ip:/ /mnt/ 2. fd = open("/mnt/file", O_ACCMODE|O_DIRECT|O_CREAT) 3. close(fd) 4. fd = open("/mnt/file", O_ACCMODE|O_DIRECT) Server nfsd4_decode_share_access() will fail with error nfserr_bad_xdr when client use incorrect share access mode of 0. Fix this by using NFS4_SHARE_ACCESS_BOTH share access mode in client, just like firstly opening. Fixes: ce4ef7c0a8a05 ("NFS: Split out NFS v4 file operations") Signed-off-by: ChenXiaoSong Signed-off-by: Trond Myklebust Signed-off-by: Sasha Levin --- fs/nfs/dir.c | 10 ---------- fs/nfs/internal.h | 10 ++++++++++ fs/nfs/nfs4file.c | 6 ++++-- 3 files changed, 14 insertions(+), 12 deletions(-) diff --git a/fs/nfs/dir.c b/fs/nfs/dir.c index 2ad56ff4752c..9f88ca7b2001 100644 --- a/fs/nfs/dir.c +++ b/fs/nfs/dir.c @@ -1628,16 +1628,6 @@ const struct dentry_operations nfs4_dentry_operations = { }; EXPORT_SYMBOL_GPL(nfs4_dentry_operations); -static fmode_t flags_to_mode(int flags) -{ - fmode_t res = (__force fmode_t)flags & FMODE_EXEC; - if ((flags & O_ACCMODE) != O_WRONLY) - res |= FMODE_READ; - if ((flags & O_ACCMODE) != O_RDONLY) - res |= FMODE_WRITE; - return res; -} - static struct nfs_open_context *create_nfs_open_context(struct dentry *dentry, int open_flags, struct file *filp) { return alloc_nfs_open_context(dentry, flags_to_mode(open_flags), filp); diff --git a/fs/nfs/internal.h b/fs/nfs/internal.h index 7de38abb6566..7009a8dddd45 100644 --- a/fs/nfs/internal.h +++ b/fs/nfs/internal.h @@ -42,6 +42,16 @@ static inline bool nfs_lookup_is_soft_revalidate(const struct dentry *dentry) return true; } +static inline fmode_t flags_to_mode(int flags) +{ + fmode_t res = (__force fmode_t)flags & FMODE_EXEC; + if ((flags & O_ACCMODE) != O_WRONLY) + res |= FMODE_READ; + if ((flags & O_ACCMODE) != O_RDONLY) + res |= FMODE_WRITE; + return res; +} + /* * Note: RFC 1813 doesn't limit the number of auth flavors that * a server can return, so make something up. diff --git a/fs/nfs/nfs4file.c b/fs/nfs/nfs4file.c index 7b13408a2d70..9fdecd909049 100644 --- a/fs/nfs/nfs4file.c +++ b/fs/nfs/nfs4file.c @@ -32,6 +32,7 @@ nfs4_file_open(struct inode *inode, struct file *filp) struct dentry *parent = NULL; struct inode *dir; unsigned openflags = filp->f_flags; + fmode_t f_mode; struct iattr attr; int err; @@ -50,8 +51,9 @@ nfs4_file_open(struct inode *inode, struct file *filp) if (err) return err; + f_mode = filp->f_mode; if ((openflags & O_ACCMODE) == 3) - openflags--; + f_mode |= flags_to_mode(openflags); /* We can't create new files here */ openflags &= ~(O_CREAT|O_EXCL); @@ -59,7 +61,7 @@ nfs4_file_open(struct inode *inode, struct file *filp) parent = dget_parent(dentry); dir = d_inode(parent); - ctx = alloc_nfs_open_context(file_dentry(filp), filp->f_mode, filp); + ctx = alloc_nfs_open_context(file_dentry(filp), f_mode, filp); err = PTR_ERR(ctx); if (IS_ERR(ctx)) goto out; -- 2.35.1