Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3708127pxk; Tue, 29 Sep 2020 04:23:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwk0bJpCMnOLzBfsETfbFmE5mx1Fki1sXX6p8zH2dHTCsa4jq4bxlHt/JbVDmNAIzpYoJg9 X-Received: by 2002:aa7:d78f:: with SMTP id s15mr2610518edq.322.1601378590844; Tue, 29 Sep 2020 04:23:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601378590; cv=none; d=google.com; s=arc-20160816; b=TNsjzS9hG9pKsNzackMGVdmW5OVe5wiJsrCgmAw8GTpXAhfpbU+DqeGlGey9+h/lE3 QjpMpAs9gMOc2Dkt8r4IQbds+T1uiGh92l/5tGVZNMtZAccwBJDi2kiKtuwnQ+mHA4AH wg/0zo8fVZLfkxjdtLCAKkSqtSATp3B+w3Xbt9usbjbbfivrNIv1buOObwa2X+KTEf1Y piXPefDvGWwqhvLH2ZFVrgNZQXOKodrRG7cJGx1bLuK2gDoU1QTNigH1XNMygWRK54dt zUPO+DuA5Doa79o6haglAkjFMr6z3qFK0RTvppN82CMQVZR7+uBpQ1fqSqulwv4vkpuN fLHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KnI6cjMZTu/9ro4YT4sDMypFE7lNCTy2DcfKPJZcEVY=; b=zvONacxXNHF3ebNbzWDsbPiKLxPzFi3QHPjPTBkifRQIipgE0EXiDcvCfGqKMurLG6 VULG0vhElOzlSnnnbICF2ywGGd1rogIR6a79cBfBWaMBV3Wc/h9G75CQOeGr6sq/OTRw 3zqC7frupQpjvZqyPB/qSI5Y9aCaaaoGkwUvBauyF1uuSRqudQ+RrN2ZKQ+fWBwc+j0J +TO/izOYJq34uMZwCn7xaPFNm2vKlALL68bX58woqL5KucmUA3HkgXaeUmVjz56eIPih hpV5UUtwsWwvWmTY+DNPN78B2jVlMhIfRCxmC+YHKuTAbu4chWx2g57AEh5q9wMJDzgp gZhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="EV/W3tA7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v15si2606324ede.489.2020.09.29.04.22.48; Tue, 29 Sep 2020 04:23:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="EV/W3tA7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729266AbgI2LQH (ORCPT + 99 others); Tue, 29 Sep 2020 07:16:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:60662 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729551AbgI2LQB (ORCPT ); Tue, 29 Sep 2020 07:16:01 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0A75C21D41; Tue, 29 Sep 2020 11:15:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601378160; bh=G2pROOOvv0dU3i/XznMnDTbgZaexADnv4FKP0yQoJY8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EV/W3tA7yFidhb268XibEDhwWorqSHfLJYwonn43w3gLaz8Lq9CwcWinfmodUcN/x 0/qnNg5CxR3/c7Zi1UUblZxnbcsGBMz4tm+mGId+KOMwN9HLf4GFMym/ZkcaYSxUdR 8I6bhKFzDoKpLBKAeB301LZVDq1Zw3B2RyieoXRg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Darrick J. Wong" , Dave Chinner , Sasha Levin Subject: [PATCH 4.14 082/166] xfs: dont ever return a stale pointer from __xfs_dir3_free_read Date: Tue, 29 Sep 2020 12:59:54 +0200 Message-Id: <20200929105939.308636246@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105935.184737111@linuxfoundation.org> References: <20200929105935.184737111@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Darrick J. Wong [ Upstream commit 1cb5deb5bc095c070c09a4540c45f9c9ba24be43 ] If we decide that a directory free block is corrupt, we must take care not to leak a buffer pointer to the caller. After xfs_trans_brelse returns, the buffer can be freed or reused, which means that we have to set *bpp back to NULL. Callers are supposed to notice the nonzero return value and not use the buffer pointer, but we should code more defensively, even if all current callers handle this situation correctly. Fixes: de14c5f541e7 ("xfs: verify free block header fields") Signed-off-by: Darrick J. Wong Reviewed-by: Dave Chinner Signed-off-by: Sasha Levin --- fs/xfs/libxfs/xfs_dir2_node.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/xfs/libxfs/xfs_dir2_node.c b/fs/xfs/libxfs/xfs_dir2_node.c index 682e2bf370c72..ee4ebc2dd7492 100644 --- a/fs/xfs/libxfs/xfs_dir2_node.c +++ b/fs/xfs/libxfs/xfs_dir2_node.c @@ -212,6 +212,7 @@ __xfs_dir3_free_read( xfs_buf_ioerror(*bpp, -EFSCORRUPTED); xfs_verifier_error(*bpp); xfs_trans_brelse(tp, *bpp); + *bpp = NULL; return -EFSCORRUPTED; } -- 2.25.1