diff options
author | Trond Myklebust <trond.myklebust@hammerspace.com> | 2024-05-06 12:30:04 -0400 |
---|---|---|
committer | Chuck Lever <chuck.lever@oracle.com> | 2024-05-06 12:47:24 -0400 |
commit | e221c45da3770962418fb30c27d941bbc70d595a (patch) | |
tree | 32ab3716e7d31c1b93d0788d9eaa5d32c8403574 /fs/nfsd | |
parent | 442d27ff09a218b61020ab56387dbc508ad6bfa6 (diff) | |
download | linux-e221c45da3770962418fb30c27d941bbc70d595a.tar.gz linux-e221c45da3770962418fb30c27d941bbc70d595a.tar.bz2 linux-e221c45da3770962418fb30c27d941bbc70d595a.zip |
knfsd: LOOKUP can return an illegal error value
The 'NFS error' NFSERR_OPNOTSUPP is not described by any of the official
NFS related RFCs, but appears to have snuck into some older .x files for
NFSv2.
Either way, it is not in RFC1094, RFC1813 or any of the NFSv4 RFCs, so
should not be returned by the knfsd server, and particularly not by the
"LOOKUP" operation.
Instead, let's return NFSERR_STALE, which is more appropriate if the
filesystem encodes the filehandle as FILEID_INVALID.
Cc: stable@vger.kernel.org
Signed-off-by: Trond Myklebust <trond.myklebust@hammerspace.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Diffstat (limited to 'fs/nfsd')
-rw-r--r-- | fs/nfsd/nfsfh.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/fs/nfsd/nfsfh.c b/fs/nfsd/nfsfh.c index 40fecf7b224f..0b75305fb5f5 100644 --- a/fs/nfsd/nfsfh.c +++ b/fs/nfsd/nfsfh.c @@ -573,7 +573,7 @@ fh_compose(struct svc_fh *fhp, struct svc_export *exp, struct dentry *dentry, _fh_update(fhp, exp, dentry); if (fhp->fh_handle.fh_fileid_type == FILEID_INVALID) { fh_put(fhp); - return nfserr_opnotsupp; + return nfserr_stale; } return 0; @@ -599,7 +599,7 @@ fh_update(struct svc_fh *fhp) _fh_update(fhp, fhp->fh_export, dentry); if (fhp->fh_handle.fh_fileid_type == FILEID_INVALID) - return nfserr_opnotsupp; + return nfserr_stale; return 0; out_bad: printk(KERN_ERR "fh_update: fh not verified!\n"); |