SUNRPC: Fix READ_PLUS crasher
authorChuck Lever <chuck.lever@oracle.com>
Thu, 30 Jun 2022 20:48:18 +0000 (16:48 -0400)
committerChuck Lever <chuck.lever@oracle.com>
Thu, 30 Jun 2022 21:41:08 +0000 (17:41 -0400)
Looks like there are still cases when "space_left - frag1bytes" can
legitimately exceed PAGE_SIZE. Ensure that xdr->end always remains
within the current encode buffer.

Reported-by: Bruce Fields <bfields@fieldses.org>
Reported-by: Zorro Lang <zlang@redhat.com>
Link: https://bugzilla.kernel.org/show_bug.cgi?id=216151
Fixes: 6c254bf3b637 ("SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer()")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
net/sunrpc/xdr.c

index f87a2d8f23a728848b69b462afa8a0a267445777..5d2b3e6979fb9c4b759a7e5a650298d68c6ef3a1 100644 (file)
@@ -984,7 +984,7 @@ static noinline __be32 *xdr_get_next_encode_buffer(struct xdr_stream *xdr,
        p = page_address(*xdr->page_ptr);
        xdr->p = p + frag2bytes;
        space_left = xdr->buf->buflen - xdr->buf->len;
-       if (space_left - nbytes >= PAGE_SIZE)
+       if (space_left - frag1bytes >= PAGE_SIZE)
                xdr->end = p + PAGE_SIZE;
        else
                xdr->end = p + space_left - frag1bytes;