There could be a case, when NFSd file system is mounted in network, different to socket's one, like below: "ip netns exec" creates new network and mount namespace, which duplicates NFSd mount point, created in init_net context. And thus NFS server stop in nested network context leads to RPCBIND client destruction in init_net. Then, on NFSd start in nested network context, rpc.nfsd process creates socket in nested net and passes it into "write_ports", which leads to RPCBIND sockets creation in init_net context because of the same reason (NFSd monut point was created in init_net context). An attempt to register passed socket in nested net leads to panic, because no RPCBIND client present in nexted network namespace. This patch add check that passed socket's net matches NFSd superblock's one. And returns -EINVAL error to user psace otherwise. v2: Put socket on exit. Reported-by: Weng Meiling <wengmeiling.weng@huawei.com> Signed-off-by: Stanislav Kinsbursky <skinsbursky@parallels.com> Cc: stable@vger.kernel.org Signed-off-by: J. Bruce Fields <bfields@redhat.com>
75 lines
2.0 KiB
C
75 lines
2.0 KiB
C
/*
|
|
* linux/include/linux/sunrpc/svcsock.h
|
|
*
|
|
* RPC server socket I/O.
|
|
*
|
|
* Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
|
|
*/
|
|
|
|
#ifndef SUNRPC_SVCSOCK_H
|
|
#define SUNRPC_SVCSOCK_H
|
|
|
|
#include <linux/sunrpc/svc.h>
|
|
#include <linux/sunrpc/svc_xprt.h>
|
|
|
|
/*
|
|
* RPC server socket.
|
|
*/
|
|
struct svc_sock {
|
|
struct svc_xprt sk_xprt;
|
|
struct socket * sk_sock; /* berkeley socket layer */
|
|
struct sock * sk_sk; /* INET layer */
|
|
|
|
/* We keep the old state_change and data_ready CB's here */
|
|
void (*sk_ostate)(struct sock *);
|
|
void (*sk_odata)(struct sock *, int bytes);
|
|
void (*sk_owspace)(struct sock *);
|
|
|
|
/* private TCP part */
|
|
/* On-the-wire fragment header: */
|
|
__be32 sk_reclen;
|
|
/* As we receive a record, this includes the length received so
|
|
* far (including the fragment header): */
|
|
u32 sk_tcplen;
|
|
/* Total length of the data (not including fragment headers)
|
|
* received so far in the fragments making up this rpc: */
|
|
u32 sk_datalen;
|
|
|
|
struct page * sk_pages[RPCSVC_MAXPAGES]; /* received data */
|
|
};
|
|
|
|
static inline u32 svc_sock_reclen(struct svc_sock *svsk)
|
|
{
|
|
return ntohl(svsk->sk_reclen) & RPC_FRAGMENT_SIZE_MASK;
|
|
}
|
|
|
|
static inline u32 svc_sock_final_rec(struct svc_sock *svsk)
|
|
{
|
|
return ntohl(svsk->sk_reclen) & RPC_LAST_STREAM_FRAGMENT;
|
|
}
|
|
|
|
/*
|
|
* Function prototypes.
|
|
*/
|
|
void svc_close_net(struct svc_serv *, struct net *);
|
|
int svc_recv(struct svc_rqst *, long);
|
|
int svc_send(struct svc_rqst *);
|
|
void svc_drop(struct svc_rqst *);
|
|
void svc_sock_update_bufs(struct svc_serv *serv);
|
|
bool svc_alien_sock(struct net *net, int fd);
|
|
int svc_addsock(struct svc_serv *serv, const int fd,
|
|
char *name_return, const size_t len);
|
|
void svc_init_xprt_sock(void);
|
|
void svc_cleanup_xprt_sock(void);
|
|
struct svc_xprt *svc_sock_create(struct svc_serv *serv, int prot);
|
|
void svc_sock_destroy(struct svc_xprt *);
|
|
|
|
/*
|
|
* svc_makesock socket characteristics
|
|
*/
|
|
#define SVC_SOCK_DEFAULTS (0U)
|
|
#define SVC_SOCK_ANONYMOUS (1U << 0) /* don't register with pmap */
|
|
#define SVC_SOCK_TEMPORARY (1U << 1) /* flag socket as temporary */
|
|
|
|
#endif /* SUNRPC_SVCSOCK_H */
|