Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3701019pxk; Tue, 29 Sep 2020 04:11:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxeHkp2xmDobEpltLdxMxHctJE2NM8uh9Q2MnhThtge5qZEO7yeRPkDRRsOOCFdr1Xo1jYe X-Received: by 2002:a17:906:ae50:: with SMTP id lf16mr3155941ejb.343.1601377912411; Tue, 29 Sep 2020 04:11:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601377912; cv=none; d=google.com; s=arc-20160816; b=c2SNMN8p1Y72DAXqRfwdaqaGcyhk1mxPVCaTezHKpi8hZlnkB4ZnpilBhhM+MBxyAV p2aDabcCh+ZOkGQooR4ACbyIImybMexCYFReiH/J050xHXydI4Ms5cRE0dW4svEBFHer n10GvUZBYgbEY48V4GmTvF85j3jJwKDWCaeSLwzPaoYNCJ6DStiRP7Bi4qO7OYghc+em 0ecljV1QCuXyxkU4x9YzujKvplp87mWh5ubOJhNzKSU4O9qVatph7s6zWO5H+xYpBOGz AzTmxxGowjKxjc8LNGcp63UYm5Vhfsg6HIcCFdPGneqFlu3iO9pfSbQ3VGKdSJgqxEjD MLLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JnOL8q9KjWU4a2/5cQBmTtzg1oUSW5cIWEqdShq22J0=; b=eNFJT2WH0Ku+IgVcLVgds7/1toV501mLPTMSJnMI4eJwyHV7oXjPEbiSRhfOCuP9jv VWbk0NOCdmScFEPZnFZWsqma1f+DBetS7TEtW8iwLtmnwiEVMPUU+e++fQLy+wKsrpyh obShF63FVR+Pq6fTErg3H6y22yHImXoofKu+fCsoGxG2WGUgCbrtAZFQPaVOLeWiApuA o7aDozQV5RFVjUaWVaKnX/oLk0eW4oBQEM9e3VRT8o1AVtQxT1yDU/ZZcr8PMDgU+dER /qs8U/VfwIZhw4ItP8yVXFjsRrcHR+LZs3O2iOCRcMJ6//3fNAms/XfkkNCs8Ez21qTv aSpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=w5QJkffL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g8si2436659ejr.733.2020.09.29.04.11.28; Tue, 29 Sep 2020 04:11:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=w5QJkffL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729073AbgI2LJR (ORCPT + 99 others); Tue, 29 Sep 2020 07:09:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:49414 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728757AbgI2LJP (ORCPT ); Tue, 29 Sep 2020 07:09:15 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6A42C21D46; Tue, 29 Sep 2020 11:09:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601377755; bh=sBa5jtK4Ogcxf59q+B0NA+czpwQc2U756MZkaPFr8UQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=w5QJkffLqfEu4ZDELPiLoS7ZUiFzjrnQdB0wn6wZ59oifg7i2VQyXPh+PSSRB8Q89 5Z7eIbxB48qSIrhPpm3sygC1rUQcEjRTb2krG2FmdS6UVtO1YTXcXB3FQ9GeC/sHaK DczjX2cvl90nvF9Cbyd1YCyCyeWQvRieXOMc7jz4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Darrick J. Wong" , Dave Chinner , Sasha Levin Subject: [PATCH 4.9 061/121] xfs: dont ever return a stale pointer from __xfs_dir3_free_read Date: Tue, 29 Sep 2020 13:00:05 +0200 Message-Id: <20200929105933.197599878@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105930.172747117@linuxfoundation.org> References: <20200929105930.172747117@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Darrick J. Wong [ Upstream commit 1cb5deb5bc095c070c09a4540c45f9c9ba24be43 ] If we decide that a directory free block is corrupt, we must take care not to leak a buffer pointer to the caller. After xfs_trans_brelse returns, the buffer can be freed or reused, which means that we have to set *bpp back to NULL. Callers are supposed to notice the nonzero return value and not use the buffer pointer, but we should code more defensively, even if all current callers handle this situation correctly. Fixes: de14c5f541e7 ("xfs: verify free block header fields") Signed-off-by: Darrick J. Wong Reviewed-by: Dave Chinner Signed-off-by: Sasha Levin --- fs/xfs/libxfs/xfs_dir2_node.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/xfs/libxfs/xfs_dir2_node.c b/fs/xfs/libxfs/xfs_dir2_node.c index bbd1238852b3c..df7f33e60a4f6 100644 --- a/fs/xfs/libxfs/xfs_dir2_node.c +++ b/fs/xfs/libxfs/xfs_dir2_node.c @@ -212,6 +212,7 @@ __xfs_dir3_free_read( xfs_buf_ioerror(*bpp, -EFSCORRUPTED); xfs_verifier_error(*bpp); xfs_trans_brelse(tp, *bpp); + *bpp = NULL; return -EFSCORRUPTED; } -- 2.25.1