diff options
author | Al Viro <[email protected]> | 2019-03-26 01:40:38 +0000 |
---|---|---|
committer | Al Viro <[email protected]> | 2019-04-01 00:31:02 -0400 |
commit | 0cdc17ebd2072b6cdd3ec3695ea7ede745664a8b (patch) | |
tree | 7feee598cba29b9c9adf1a3d7c4e9548860a24f3 | |
parent | 4fdcfab5b5537c21891e22e65996d4d0dd8ab4ca (diff) |
ubifs: fix use-after-free on symlink traversal
free the symlink body after the same RCU delay we have for freeing the
struct inode itself, so that traversal during RCU pathwalk wouldn't step
into freed memory.
Signed-off-by: Al Viro <[email protected]>
-rw-r--r-- | fs/ubifs/super.c | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/fs/ubifs/super.c b/fs/ubifs/super.c index 8dc2818fdd84..12628184772c 100644 --- a/fs/ubifs/super.c +++ b/fs/ubifs/super.c @@ -276,14 +276,12 @@ static void ubifs_i_callback(struct rcu_head *head) { struct inode *inode = container_of(head, struct inode, i_rcu); struct ubifs_inode *ui = ubifs_inode(inode); + kfree(ui->data); kmem_cache_free(ubifs_inode_slab, ui); } static void ubifs_destroy_inode(struct inode *inode) { - struct ubifs_inode *ui = ubifs_inode(inode); - - kfree(ui->data); call_rcu(&inode->i_rcu, ubifs_i_callback); } |