Re: [PATCH] cifs: fix kref underflow in close_shroot()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



ср, 27 мар. 2019 г. в 22:27, ronnie sahlberg <ronniesahlberg@xxxxxxxxx>:
>
> Yeah, probably
>
> On Thu, Mar 28, 2019 at 3:11 PM Steve French <smfrench@xxxxxxxxx> wrote:
> >
> > Should this be CC:stable?
> >
> > On Wed, Mar 27, 2019 at 8:21 PM Ronnie Sahlberg <lsahlber@xxxxxxxxxx> wrote:
> > >
> > > Fix a bug where we used to not initialize the cached fid structure at all
> > > in open_shroot() if the open was successful but we did not get a lease.
> > > This would leave the structure uninitialized and later when we close the handle
> > > we would in close_shroot() try to kref_put() an uninitialized refcount.
> > >
> > > Fix this by always initializing this structure if the open was successful
> > > but only do the extra get() if we got a lease.
> > > This extra get() is only used to hold the structure until we get a lease
> > > break from the server at which point we will kref_put() it during lease
> > > processing.
> > >
> > > Signed-off-by: Ronnie Sahlberg <lsahlber@xxxxxxxxxx>
> > > ---
> > >  fs/cifs/smb2ops.c | 16 +++++++---------
> > >  1 file changed, 7 insertions(+), 9 deletions(-)
> > >
> > > diff --git a/fs/cifs/smb2ops.c b/fs/cifs/smb2ops.c
> > > index 1022a3771e14..7cfafac255aa 100644
> > > --- a/fs/cifs/smb2ops.c
> > > +++ b/fs/cifs/smb2ops.c
> > > @@ -717,20 +717,18 @@ int open_shroot(unsigned int xid, struct cifs_tcon *tcon, struct cifs_fid *pfid)
> > >         oparms.fid->mid = le64_to_cpu(o_rsp->sync_hdr.MessageId);
> > >  #endif /* CIFS_DEBUG2 */
> > >
> > > -       if (o_rsp->OplockLevel == SMB2_OPLOCK_LEVEL_LEASE)
> > > -               oplock = smb2_parse_lease_state(server, o_rsp,
> > > -                                               &oparms.fid->epoch,
> > > -                                               oparms.fid->lease_key);
> > > -       else
> > > -               goto oshr_exit;
> > > -
> > > -
> > >         memcpy(tcon->crfid.fid, pfid, sizeof(struct cifs_fid));
> > >         tcon->crfid.tcon = tcon;
> > >         tcon->crfid.is_valid = true;
> > >         kref_init(&tcon->crfid.refcount);
> > > -       kref_get(&tcon->crfid.refcount);
> > >
> > > +       if (o_rsp->OplockLevel == SMB2_OPLOCK_LEVEL_LEASE) {
> > > +               kref_get(&tcon->crfid.refcount);
> > > +               oplock = smb2_parse_lease_state(server, o_rsp,
> > > +                                               &oparms.fid->epoch,
> > > +                                               oparms.fid->lease_key);
> > > +       } else
> > > +               goto oshr_exit;
> > >
> > >         qi_rsp = (struct smb2_query_info_rsp *)rsp_iov[1].iov_base;
> > >         if (le32_to_cpu(qi_rsp->OutputBufferLength) < sizeof(struct smb2_file_all_info))
> > > --
> > > 2.13.6
> > >
> >
> >
> > --
> > Thanks,
> >
> > Steve

This part of the fix looks good but there is another piece remaining:

rc = smb2_validate_and_copy_iov(
    le16_to_cpu(qi_rsp->OutputBufferOffset),
    sizeof(struct smb2_file_all_info),
    &rsp_iov[1], sizeof(struct smb2_file_all_info),
    (char *)&tcon->crfid.file_all_info);
if (rc)
    goto oshr_exit;
    ^^^
here RC is non-zero, but we are returning with 2 references on the
handle. The caller will assume that the open failed and doesn't call
close_shroot thus leaking one reference.

The result of smb2_validate_and_copy_iov only affects file_all_info
caching but doesn't affect the handle validity. So, RC needs to be
reset to 0 unconditionally here before returning from the function.

I checked v5.0 kernel and it doesn't seem it is affected by this bug
but it has the problem that it doesn't check whether server granted
the lease or not - probably it is not that bad to keep the reference
forever for non-leased opens, so leaving it for your choice to fix it
or not.

--
Best regards,
Pavel Shilovsky




[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux