diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2019-03-26 01:38:58 +0000 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-05-16 09:17:16 +0200 |
commit | d98c0b86e7a1f3356f48d8d2d5f8d1d1dd9b774c (patch) | |
tree | 95de94636cc27b6e02c3405d62afc9ff3ccebb84 | |
parent | a826eff401e6d15139635e1dcc04ed6930387d4f (diff) | |
download | linux-stable-d98c0b86e7a1f3356f48d8d2d5f8d1d1dd9b774c.tar.gz linux-stable-d98c0b86e7a1f3356f48d8d2d5f8d1d1dd9b774c.tar.bz2 linux-stable-d98c0b86e7a1f3356f48d8d2d5f8d1d1dd9b774c.zip |
ceph: fix use-after-free on symlink traversal
[ Upstream commit daf5cc27eed99afdea8d96e71b89ba41f5406ef6 ]
free the symlink body after the same RCU delay we have for freeing the
struct inode itself, so that traversal during RCU pathwalk wouldn't step
into freed memory.
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Signed-off-by: Sasha Levin (Microsoft) <sashal@kernel.org>
-rw-r--r-- | fs/ceph/inode.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/ceph/inode.c b/fs/ceph/inode.c index 7a1df90c7771..7641fcf83ac8 100644 --- a/fs/ceph/inode.c +++ b/fs/ceph/inode.c @@ -472,6 +472,7 @@ static void ceph_i_callback(struct rcu_head *head) struct inode *inode = container_of(head, struct inode, i_rcu); struct ceph_inode_info *ci = ceph_inode(inode); + kfree(ci->i_symlink); kmem_cache_free(ceph_inode_cachep, ci); } @@ -503,7 +504,6 @@ void ceph_destroy_inode(struct inode *inode) ceph_put_snap_realm(mdsc, realm); } - kfree(ci->i_symlink); while ((n = rb_first(&ci->i_fragtree)) != NULL) { frag = rb_entry(n, struct ceph_inode_frag, node); rb_erase(n, &ci->i_fragtree); |