]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
nfsd: use dynamic allocation for oversized NFSv4.0 replay cache
authorChuck Lever <chuck.lever@oracle.com>
Tue, 24 Feb 2026 17:10:34 +0000 (12:10 -0500)
committerChuck Lever <chuck.lever@oracle.com>
Mon, 30 Mar 2026 01:25:09 +0000 (21:25 -0400)
Commit 1e8e9913672a ("nfsd: fix heap overflow in NFSv4.0 LOCK
replay cache") capped the replay cache copy at NFSD4_REPLAY_ISIZE
to prevent a heap overflow, but set rp_buflen to zero when the
encoded response exceeded the inline buffer. A retransmitted LOCK
reaching the replay path then produced only a status code with no
operation body, resulting in a malformed XDR response.

When the encoded response exceeds the 112-byte inline rp_ibuf, a
buffer is kmalloc'd to hold it. If the allocation fails, rp_buflen
remains zero, preserving the behavior from the capped-copy fix.
The buffer is freed when the stateowner is released or when a
subsequent operation's response fits in the inline buffer.

Fixes: 1e8e9913672a ("nfsd: fix heap overflow in NFSv4.0 LOCK replay cache")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
fs/nfsd/nfs4state.c
fs/nfsd/nfs4xdr.c
fs/nfsd/state.h

index ba49f49bb93b9f590a0afa9910c7c2058f9b11e4..b4d0e82b2690f17c001df2e86cae1cfa63cc5a85 100644 (file)
@@ -1496,8 +1496,24 @@ release_all_access(struct nfs4_ol_stateid *stp)
        }
 }
 
+/**
+ * nfs4_replay_free_cache - release dynamically allocated replay buffer
+ * @rp: replay cache to reset
+ *
+ * If @rp->rp_buf points to a kmalloc'd buffer, free it and reset
+ * rp_buf to the inline rp_ibuf. Always zeroes rp_buflen.
+ */
+void nfs4_replay_free_cache(struct nfs4_replay *rp)
+{
+       if (rp->rp_buf != rp->rp_ibuf)
+               kfree(rp->rp_buf);
+       rp->rp_buf = rp->rp_ibuf;
+       rp->rp_buflen = 0;
+}
+
 static inline void nfs4_free_stateowner(struct nfs4_stateowner *sop)
 {
+       nfs4_replay_free_cache(&sop->so_replay);
        kfree(sop->so_owner.data);
        sop->so_ops->so_free(sop);
 }
index 690f7a3122ec51d2e69e4bba7502fdf27a8ca490..2a0946c630e1d0aeef47f10c5b699a7bc8e3c5b0 100644 (file)
@@ -6282,14 +6282,23 @@ nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
                int len = xdr->buf->len - (op_status_offset + XDR_UNIT);
 
                so->so_replay.rp_status = op->status;
-               if (len <= NFSD4_REPLAY_ISIZE) {
-                       so->so_replay.rp_buflen = len;
-                       read_bytes_from_xdr_buf(xdr->buf,
-                                               op_status_offset + XDR_UNIT,
-                                               so->so_replay.rp_buf, len);
-               } else {
-                       so->so_replay.rp_buflen = 0;
+               if (len > NFSD4_REPLAY_ISIZE) {
+                       char *buf = kmalloc(len, GFP_KERNEL);
+
+                       nfs4_replay_free_cache(&so->so_replay);
+                       if (buf) {
+                               so->so_replay.rp_buf = buf;
+                       } else {
+                               /* rp_buflen already zeroed; skip caching */
+                               goto status;
+                       }
+               } else if (so->so_replay.rp_buf != so->so_replay.rp_ibuf) {
+                       nfs4_replay_free_cache(&so->so_replay);
                }
+               so->so_replay.rp_buflen = len;
+               read_bytes_from_xdr_buf(xdr->buf,
+                                       op_status_offset + XDR_UNIT,
+                                       so->so_replay.rp_buf, len);
        }
 status:
        op->status = nfsd4_map_status(op->status,
index 3159c7b67f503d59cadfd1f9bdb7823e5e7e6bf2..9b05462da4cc1353b09843eeddc972afbdaac574 100644 (file)
@@ -554,10 +554,10 @@ struct nfs4_client_reclaim {
  *   ~32(deleg. ace) = 112 bytes
  *
  * Some responses can exceed this. A LOCK denial includes the conflicting
- * lock owner, which can be up to 1024 bytes (NFS4_OPAQUE_LIMIT). Responses
- * larger than REPLAY_ISIZE are not cached in rp_ibuf; only rp_status is
- * saved. Enlarging this constant increases the size of every
- * nfs4_stateowner.
+ * lock owner, which can be up to 1024 bytes (NFS4_OPAQUE_LIMIT). When a
+ * response exceeds REPLAY_ISIZE, a buffer is dynamically allocated. If
+ * that allocation fails, only rp_status is saved. Enlarging this constant
+ * increases the size of every nfs4_stateowner.
  */
 
 #define NFSD4_REPLAY_ISIZE       112 
@@ -569,12 +569,14 @@ struct nfs4_client_reclaim {
 struct nfs4_replay {
        __be32                  rp_status;
        unsigned int            rp_buflen;
-       char                    *rp_buf;
+       char                    *rp_buf; /* rp_ibuf or kmalloc'd */
        struct knfsd_fh         rp_openfh;
        int                     rp_locked;
        char                    rp_ibuf[NFSD4_REPLAY_ISIZE];
 };
 
+extern void nfs4_replay_free_cache(struct nfs4_replay *rp);
+
 struct nfs4_stateowner;
 
 struct nfs4_stateowner_operations {