NFSD: fix LISTXATTRS returning a short list with eof=TRUE
If the XDR buffer is not large enough to fit all attributes and the remaining bytes left in the XDR buffer (xdrleft) is equal to the number of bytes for the current attribute, then the loop will prematurely exit without setting eof to FALSE. Also in this case, adding the eof flag to the buffer will make the reply 4 bytes larger than lsxa_maxcount. Need to check if there are enough bytes to fit not only the next attribute name but also the eof as well. Fixes: 23e50fe3a5e6 ("nfsd: implement the xattr functions and en/decode logic") Signed-off-by: Jorge Mora <mora@netapp.com> Reviewed-by: Jeff Layton <jlayton@kernel.org> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
This commit is contained in:
parent
61ab5e0758
commit
2f73f37d66
@ -5447,7 +5447,8 @@ nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr,
|
||||
|
||||
slen -= XATTR_USER_PREFIX_LEN;
|
||||
xdrlen = 4 + ((slen + 3) & ~3);
|
||||
if (xdrlen > xdrleft) {
|
||||
/* Check if both entry and eof can fit in the XDR buffer */
|
||||
if (xdrlen + XDR_UNIT > xdrleft) {
|
||||
if (count == 0) {
|
||||
/*
|
||||
* Can't even fit the first attribute name.
|
||||
|
Loading…
x
Reference in New Issue
Block a user