Searched hist:eaa2b82c3b3c938ab4635f8967d33f3e581da836 (Results 1 – 1 of 1) sorted by relevance
/openbmc/linux/fs/nfs/ |
H A D | dir.c | diff eaa2b82c3b3c938ab4635f8967d33f3e581da836 Mon Jul 03 00:27:26 CDT 2017 NeilBrown <neilb@suse.com> NFS: guard against confused server in nfs_atomic_open()
A confused server could return a filehandle for an NFSv4 OPEN request, which it previously returned for a directory. So the inode returned by ->open_context() in nfs_atomic_open() could conceivably be a directory inode.
This has particular implications for the call to nfs_file_set_open_context() in nfs_finish_open(). If that is called on a directory inode, then the nfs_open_context that gets stored in the filp->private_data will be linked to nfs_inode->open_files.
When the directory is closed, nfs_closedir() will (ultimately) free the ->private_data, but not unlink it from nfs_inode->open_files (because it doesn't expect an nfs_open_context there).
Subsequently the memory could get used for something else and eventually if the ->open_files list is walked, the walker will fall off the end and crash.
So: change nfs_finish_open() to only call nfs_file_set_open_context() for regular-file inodes.
This failure mode has been seen in a production setting (unknown NFS server implementation). The kernel was v3.0 and the specific sequence seen would not affect more recent kernels, but I think a risk is still present, and caution is wise.
Signed-off-by: NeilBrown <neilb@suse.com> Signed-off-by: Anna Schumaker <Anna.Schumaker@Netapp.com>
|