Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp831774rdb; Fri, 17 Nov 2023 14:14:42 -0800 (PST) X-Google-Smtp-Source: AGHT+IHyVkaQED0XrxYLVF5MJIOi/6lccJyXDJUYWI2HlbY04I60uwHJY1TfcJ/CJB/tT8rDbn5K X-Received: by 2002:a05:6a00:1d19:b0:693:3e55:59b4 with SMTP id a25-20020a056a001d1900b006933e5559b4mr901835pfx.8.1700259281922; Fri, 17 Nov 2023 14:14:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700259281; cv=none; d=google.com; s=arc-20160816; b=Z+KrEtJOKYCVTe2mvKqdMtiV5Ry21yN7g0K2AfV/1pW4K47MltJNIOR8ABX1z0OL+4 zK2+0Ne7bejgGDPDGyCDGyYqU7INrM3ZF5wLN3n/v0tWcCPYzD2bx4A7Ja0U/nZ5YlYl 4asSHjinvrJu3WBlfOVIXf9jsQCqyT4GU9aViJlMBv3BNG1yBFplFwny/1NepY7C2kOK lXIg7GyWf3TCvSTsXqkhI91QvsAlff4eV6led1F4moF/4XJ5j71YzSfpdwMtlgf5W9pg qH8Y4qoLu/m4j3kCMU9v7KaMaYw+O1LPjuOJdRXNIuvqrkogJMOYXykqw3L7NjPL2Tq6 xFTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:to:from:subject :dkim-signature; bh=skykRo3QIhNNcHp0O69svQIqK1GlbPxqU8L51kpgahk=; fh=Mys3y4MwsHRytUQMpdfGBn3oGRYLcLloxNwkFYMYMmg=; b=AZpmqR4r/3dRUhpgi8HH0SAJpb8cz/dzi2jgDsL/ZOlPLCt+5bpq0GbQf5xRW2dwYi lriL3m6jmfC6efZGFUirohs2XJPW+uKhMP+jSSR9Bbi+XsbzXVbzOsq4aXQM/Y22OhNK fnL8RRuT3PVvEWwku1fBSJzCTKlciVg4W5RzoQaYzGgJZHUMANPCn9jnCDVxbboUmBYH JOhetU3jjvFUXsFDjmCp2Gl9TGImqXDd4weZr3bFidXGPEO53lsF6jCv7hmLzLM/Un3m SESo6Gc35VUx1ghpTEfQ+WkApOaZpb6L6nzVuhXqtrtvQ7ycGwycbUj/fhB8dZWOQ2e8 sKMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OyE5bZCX; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id u30-20020a63235e000000b005be095b2545si2638079pgm.183.2023.11.17.14.14.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Nov 2023 14:14:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=OyE5bZCX; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id EE7B88256C99; Fri, 17 Nov 2023 14:14:37 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232831AbjKQWOj (ORCPT + 99 others); Fri, 17 Nov 2023 17:14:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41728 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229823AbjKQWOi (ORCPT ); Fri, 17 Nov 2023 17:14:38 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 32554D4F for ; Fri, 17 Nov 2023 14:14:35 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B3AE6C433C7 for ; Fri, 17 Nov 2023 22:14:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1700259274; bh=sup+iVZdIKvY0XQV8mPGWpmDXOHzD3LXdW+eKrvhZUc=; h=Subject:From:To:Date:In-Reply-To:References:From; b=OyE5bZCX0Jgbmh+tCvAF66pY63j7ZJbDacYiIH4F5lo/GMzzGIZdY1Lywhyh1dgAG 7Rwf8qSzBFVIo1WeL7tsPHLoHRdy1Non4MOYO9TX/q+RfOufqrYr7uvzOyURZoaeFN LS5XD3JoFJYCrFRZDi1ApMdfJQPLEJkCxatcxBxWrYTkbbgd5oa8LWAFlxV20vu56j Uh1q0bPU8sZDCtcoNNy0Kd3vkeGHJshQFmVfjG2zEg4xuYYMlcIdIGp4dDYePx/UaT +3wTx0SUCdJQ7og5XQe7goFR7Hx4TAE8d+A5lIj66BFAqC7HPrsrqgtcXamNnjUGDR XG1gbTGkMpkbA== Subject: [PATCH v2 2/4] NFSD: Replace RQ_SPLICE_OK in nfsd_read() From: Chuck Lever To: linux-nfs@vger.kernel.org Date: Fri, 17 Nov 2023 17:14:33 -0500 Message-ID: <170025927377.4577.15971872542273069502.stgit@bazille.1015granger.net> In-Reply-To: <170025895725.4577.18051288602708688381.stgit@bazille.1015granger.net> References: <170025895725.4577.18051288602708688381.stgit@bazille.1015granger.net> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Fri, 17 Nov 2023 14:14:38 -0800 (PST) From: Chuck Lever RQ_SPLICE_OK is a bit of a layering violation. Also, a subsequent patch is going to provide a mechanism for always disabling splice reads. Splicing is an issue only for NFS READs, so refactor nfsd_read() to check the auth type directly instead of relying on an rq_flag setting. The new helper will be added into the NFSv4 read path in a subsequent patch. Signed-off-by: Chuck Lever --- fs/nfsd/vfs.c | 26 +++++++++++++++++++++++++- fs/nfsd/vfs.h | 1 + 2 files changed, 26 insertions(+), 1 deletion(-) diff --git a/fs/nfsd/vfs.c b/fs/nfsd/vfs.c index fbbea7498f02..0ea7f533f816 100644 --- a/fs/nfsd/vfs.c +++ b/fs/nfsd/vfs.c @@ -1216,6 +1216,30 @@ nfsd_vfs_write(struct svc_rqst *rqstp, struct svc_fh *fhp, struct nfsd_file *nf, return nfserr; } +/** + * nfsd_read_splice_ok - check if spliced reading is supported + * @rqstp: RPC transaction context + * + * Return values: + * %true: nfsd_splice_read() may be used + * %false: nfsd_splice_read() must not be used + * + * NFS READ normally uses splice to send data in-place. However the + * data in cache can change after the reply's MIC is computed but + * before the RPC reply is sent. To prevent the client from + * rejecting the server-computed MIC in this somewhat rare case, do + * not use splice with the GSS integrity and privacy services. + */ +bool nfsd_read_splice_ok(struct svc_rqst *rqstp) +{ + switch (svc_auth_flavor(rqstp)) { + case RPC_AUTH_GSS_KRB5I: + case RPC_AUTH_GSS_KRB5P: + return false; + } + return true; +} + /** * nfsd_read - Read data from a file * @rqstp: RPC transaction context @@ -1245,7 +1269,7 @@ __be32 nfsd_read(struct svc_rqst *rqstp, struct svc_fh *fhp, return err; file = nf->nf_file; - if (file->f_op->splice_read && test_bit(RQ_SPLICE_OK, &rqstp->rq_flags)) + if (file->f_op->splice_read && nfsd_read_splice_ok(rqstp)) err = nfsd_splice_read(rqstp, fhp, file, offset, count, eof); else err = nfsd_iter_read(rqstp, fhp, file, offset, count, 0, eof); diff --git a/fs/nfsd/vfs.h b/fs/nfsd/vfs.h index e3c29596f4df..702fbc4483bf 100644 --- a/fs/nfsd/vfs.h +++ b/fs/nfsd/vfs.h @@ -114,6 +114,7 @@ __be32 nfsd_iter_read(struct svc_rqst *rqstp, struct svc_fh *fhp, struct file *file, loff_t offset, unsigned long *count, unsigned int base, u32 *eof); +bool nfsd_read_splice_ok(struct svc_rqst *rqstp); __be32 nfsd_read(struct svc_rqst *rqstp, struct svc_fh *fhp, loff_t offset, unsigned long *count, u32 *eof);