diff options
-rw-r--r-- | fs/nfsd/nfsd.h | 5 | ||||
-rw-r--r-- | fs/nfsd/nfsfh.c | 34 | ||||
-rw-r--r-- | fs/nfsd/vfs.c | 6 |
3 files changed, 39 insertions, 6 deletions
diff --git a/fs/nfsd/nfsd.h b/fs/nfsd/nfsd.h index 74f67c2aca34..ac121ad16540 100644 --- a/fs/nfsd/nfsd.h +++ b/fs/nfsd/nfsd.h | |||
@@ -70,6 +70,11 @@ int nfsd_create_serv(void); | |||
70 | 70 | ||
71 | extern int nfsd_max_blksize; | 71 | extern int nfsd_max_blksize; |
72 | 72 | ||
73 | static inline int nfsd_v4client(struct svc_rqst *rq) | ||
74 | { | ||
75 | return rq->rq_prog == NFS_PROGRAM && rq->rq_vers == 4; | ||
76 | } | ||
77 | |||
73 | /* | 78 | /* |
74 | * NFSv4 State | 79 | * NFSv4 State |
75 | */ | 80 | */ |
diff --git a/fs/nfsd/nfsfh.c b/fs/nfsd/nfsfh.c index 951938d6c495..44812c32e51e 100644 --- a/fs/nfsd/nfsfh.c +++ b/fs/nfsd/nfsfh.c | |||
@@ -103,6 +103,36 @@ static __be32 nfsd_setuser_and_check_port(struct svc_rqst *rqstp, | |||
103 | return nfserrno(nfsd_setuser(rqstp, exp)); | 103 | return nfserrno(nfsd_setuser(rqstp, exp)); |
104 | } | 104 | } |
105 | 105 | ||
106 | static inline __be32 check_pseudo_root(struct svc_rqst *rqstp, | ||
107 | struct dentry *dentry, struct svc_export *exp) | ||
108 | { | ||
109 | if (!(exp->ex_flags & NFSEXP_V4ROOT)) | ||
110 | return nfs_ok; | ||
111 | /* | ||
112 | * v2/v3 clients have no need for the V4ROOT export--they use | ||
113 | * the mount protocl instead; also, further V4ROOT checks may be | ||
114 | * in v4-specific code, in which case v2/v3 clients could bypass | ||
115 | * them. | ||
116 | */ | ||
117 | if (!nfsd_v4client(rqstp)) | ||
118 | return nfserr_stale; | ||
119 | /* | ||
120 | * We're exposing only the directories and symlinks that have to be | ||
121 | * traversed on the way to real exports: | ||
122 | */ | ||
123 | if (unlikely(!S_ISDIR(dentry->d_inode->i_mode) && | ||
124 | !S_ISLNK(dentry->d_inode->i_mode))) | ||
125 | return nfserr_stale; | ||
126 | /* | ||
127 | * A pseudoroot export gives permission to access only one | ||
128 | * single directory; the kernel has to make another upcall | ||
129 | * before granting access to anything else under it: | ||
130 | */ | ||
131 | if (unlikely(dentry != exp->ex_path.dentry)) | ||
132 | return nfserr_stale; | ||
133 | return nfs_ok; | ||
134 | } | ||
135 | |||
106 | /* | 136 | /* |
107 | * Use the given filehandle to look up the corresponding export and | 137 | * Use the given filehandle to look up the corresponding export and |
108 | * dentry. On success, the results are used to set fh_export and | 138 | * dentry. On success, the results are used to set fh_export and |
@@ -299,6 +329,10 @@ fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, int type, int access) | |||
299 | * (for example, if different id-squashing options are in | 329 | * (for example, if different id-squashing options are in |
300 | * effect on the new filesystem). | 330 | * effect on the new filesystem). |
301 | */ | 331 | */ |
332 | error = check_pseudo_root(rqstp, dentry, exp); | ||
333 | if (error) | ||
334 | goto out; | ||
335 | |||
302 | error = nfsd_setuser_and_check_port(rqstp, exp); | 336 | error = nfsd_setuser_and_check_port(rqstp, exp); |
303 | if (error) | 337 | if (error) |
304 | goto out; | 338 | goto out; |
diff --git a/fs/nfsd/vfs.c b/fs/nfsd/vfs.c index a0015a958aef..f6ca32b07e11 100644 --- a/fs/nfsd/vfs.c +++ b/fs/nfsd/vfs.c | |||
@@ -72,12 +72,6 @@ struct raparm_hbucket { | |||
72 | #define RAPARM_HASH_MASK (RAPARM_HASH_SIZE-1) | 72 | #define RAPARM_HASH_MASK (RAPARM_HASH_SIZE-1) |
73 | static struct raparm_hbucket raparm_hash[RAPARM_HASH_SIZE]; | 73 | static struct raparm_hbucket raparm_hash[RAPARM_HASH_SIZE]; |
74 | 74 | ||
75 | static inline int | ||
76 | nfsd_v4client(struct svc_rqst *rq) | ||
77 | { | ||
78 | return rq->rq_prog == NFS_PROGRAM && rq->rq_vers == 4; | ||
79 | } | ||
80 | |||
81 | /* | 75 | /* |
82 | * Called from nfsd_lookup and encode_dirent. Check if we have crossed | 76 | * Called from nfsd_lookup and encode_dirent. Check if we have crossed |
83 | * a mount point. | 77 | * a mount point. |