Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2039109imm; Fri, 7 Sep 2018 09:52:49 -0700 (PDT) X-Google-Smtp-Source: ANB0Vdbnc2R5OdLuAeOMO9iv6oDH2JhNUryjOlrtZG0m9Yl0TIBzue0oN/BvripGfSX5TP1VTHT0 X-Received: by 2002:a17:902:8e81:: with SMTP id bg1-v6mr8987486plb.129.1536339169580; Fri, 07 Sep 2018 09:52:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536339169; cv=none; d=google.com; s=arc-20160816; b=TUbSjDmki1E5aBHM2hf8gyH05AKeSAdC3T+Ux15gKvUhwCqxqKqMUCj5oIsFsfgp5Z kwCvCOa1WIDU4GCvksn3KluXFYEBijBCOx1TIbf6JsmvZGnPsHVoQdM/CMjygxJsfeJF bMArXnJubBbFv1ZE/xIGoqFFxTQD9aXjYTvIPHnilclEv49wrK1Ion0TvclZECAN2PL/ srMUnqcb5wfd9OMs7oHpI7/TfsHJefVlznjykNMPQwt/YGYg4Y7vfHu/TnF4/ZRB/95R 6FbqTG0bH/Ei7jATZ74Y4eB4ta3E2P4BRpeIjFcdjS1aMDnb9O1CUKeNflJIohgR0hVp Iilg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=ePKA5ts4QDDqzsmjdOFKSboQbthLh06HxQ2FsJz3AgM=; b=0nH+jc7F1zicft0995ZxDl/sHs/FxQ1CrlbztDOFd0OCiu6RXKfz59Z3vFtfsxuq8f 4YJ5il/SMJO63nm5/J4L1yGmtxe+enQw1rlSOILnSn4WKv4P0fJjke0tA5vBnZqOp/7z hKmT2wmQh/QuN5ItZ7cfK3PWz4BrPl/VigKXD7PoMvGNrenWgbPr7fszd2eN7yqAWuLg D8D9DAI1aczP/1XiujjySc/huYz8BA5mj9iC9PJa0a7XjRzjE8zbfEfYQeZH7ltTinfI nP6exy5A1jMaZv1WhxU8Y9Hk4wompPbbsZAXTjlkv32DnlStKzJv2dGZTn6v0GcTRChe jI9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k18-v6si9188138pgm.102.2018.09.07.09.52.33; Fri, 07 Sep 2018 09:52:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727349AbeIGVdF (ORCPT + 99 others); Fri, 7 Sep 2018 17:33:05 -0400 Received: from nautica.notk.org ([91.121.71.147]:38100 "EHLO nautica.notk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726738AbeIGVdD (ORCPT ); Fri, 7 Sep 2018 17:33:03 -0400 Received: by nautica.notk.org (Postfix, from userid 1001) id 49F5CC01D; Fri, 7 Sep 2018 18:51:15 +0200 (CEST) From: Dominique Martinet To: v9fs-developer@lists.sourceforge.net, Eric Van Hensbergen , Latchesar Ionkov Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Dominique Martinet Subject: [PATCH 4/4] 9p locks: fix glock.client_id leak in do_lock Date: Fri, 7 Sep 2018 18:50:57 +0200 Message-Id: <1536339057-21974-5-git-send-email-asmadeus@codewreck.org> X-Mailer: git-send-email 1.7.10.4 In-Reply-To: <1536339057-21974-1-git-send-email-asmadeus@codewreck.org> References: <1536339057-21974-1-git-send-email-asmadeus@codewreck.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dominique Martinet the 9p client code overwrites our glock.client_id pointing to a static buffer by an allocated string holding the network provided value which we do not care about; free and reset the value as appropriate. This is almost identical to the leak in v9fs_file_getlock() fixed by Al Viro in commit ce85dd58ad5a6 ("9p: we are leaking glock.client_id in v9fs_file_getlock()"), which was returned as an error by a coverity false positive -- while we are here attempt to make the code slightly more robust to future change of the net/9p/client code and hopefully more clear to coverity that there is no problem. Signed-off-by: Dominique Martinet --- fs/9p/vfs_file.c | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/fs/9p/vfs_file.c b/fs/9p/vfs_file.c index 73857ebaedfb..a25efa782fcc 100644 --- a/fs/9p/vfs_file.c +++ b/fs/9p/vfs_file.c @@ -208,6 +208,14 @@ static int v9fs_file_do_lock(struct file *filp, int cmd, struct file_lock *fl) if (schedule_timeout_interruptible(v9ses->session_lock_timeout) != 0) break; + /* + * p9_client_lock_dotl overwrites flock.client_id with the + * server message, free and reuse the client name + */ + if (flock.client_id != fid->clnt->name) { + kfree(flock.client_id); + flock.client_id = fid->clnt->name; + } } /* map 9p status to VFS status */ @@ -239,6 +247,8 @@ static int v9fs_file_do_lock(struct file *filp, int cmd, struct file_lock *fl) locks_lock_file_wait(filp, fl); fl->fl_type = fl_type; } + if (flock.client_id != fid->clnt->name) + kfree(flock.client_id); out: return res; } @@ -273,7 +283,7 @@ static int v9fs_file_getlock(struct file *filp, struct file_lock *fl) res = p9_client_getlock_dotl(fid, &glock); if (res < 0) - return res; + goto out; /* map 9p lock type to os lock type */ switch (glock.type) { case P9_LOCK_TYPE_RDLCK: @@ -294,7 +304,9 @@ static int v9fs_file_getlock(struct file *filp, struct file_lock *fl) fl->fl_end = glock.start + glock.length - 1; fl->fl_pid = -glock.proc_id; } - kfree(glock.client_id); +out: + if (glock.client_id != fid->clnt->name) + kfree(glock.client_id); return res; } -- 2.17.1