diff options
author | Dominique Martinet <dominique.martinet@cea.fr> | 2018-09-07 19:18:43 +0300 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2018-11-21 11:19:11 +0300 |
commit | 949fd0eaf955a3319080d3bfd699044bacef0abb (patch) | |
tree | 637d9c892818324f5a6c176ed3b62fb6124027f5 /fs/udf/udf_sb.h | |
parent | e55677b9efb85513e5ffbb2adc1ad9cb314099a9 (diff) | |
download | linux-949fd0eaf955a3319080d3bfd699044bacef0abb.tar.xz |
9p locks: fix glock.client_id leak in do_lock
[ Upstream commit b4dc44b3cac9e8327e0655f530ed0c46f2e6214c ]
the 9p client code overwrites our glock.client_id pointing to a static
buffer by an allocated string holding the network provided value which
we do not care about; free and reset the value as appropriate.
This is almost identical to the leak in v9fs_file_getlock() fixed by
Al Viro in commit ce85dd58ad5a6 ("9p: we are leaking glock.client_id
in v9fs_file_getlock()"), which was returned as an error by a coverity
false positive -- while we are here attempt to make the code slightly
more robust to future change of the net/9p/client code and hopefully
more clear to coverity that there is no problem.
Link: http://lkml.kernel.org/r/1536339057-21974-5-git-send-email-asmadeus@codewreck.org
Signed-off-by: Dominique Martinet <dominique.martinet@cea.fr>
Signed-off-by: Sasha Levin <sashal@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'fs/udf/udf_sb.h')
0 files changed, 0 insertions, 0 deletions