]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
SUNRPC: Fix gss_free_in_token_pages()
authorChuck Lever <chuck.lever@oracle.com>
Tue, 7 May 2024 13:10:41 +0000 (09:10 -0400)
committerChuck Lever <chuck.lever@oracle.com>
Thu, 9 May 2024 13:10:10 +0000 (09:10 -0400)
Dan Carpenter says:
> Commit 5866efa8cbfb ("SUNRPC: Fix svcauth_gss_proxy_init()") from Oct
> 24, 2019 (linux-next), leads to the following Smatch static checker
> warning:
>
>  net/sunrpc/auth_gss/svcauth_gss.c:1039 gss_free_in_token_pages()
>  warn: iterator 'i' not incremented
>
> net/sunrpc/auth_gss/svcauth_gss.c
>     1034 static void gss_free_in_token_pages(struct gssp_in_token *in_token)
>     1035 {
>     1036         u32 inlen;
>     1037         int i;
>     1038
> --> 1039         i = 0;
>     1040         inlen = in_token->page_len;
>     1041         while (inlen) {
>     1042                 if (in_token->pages[i])
>     1043                         put_page(in_token->pages[i]);
>                                                          ^
> This puts page zero over and over.
>
>     1044                 inlen -= inlen > PAGE_SIZE ? PAGE_SIZE : inlen;
>     1045         }
>     1046
>     1047         kfree(in_token->pages);
>     1048         in_token->pages = NULL;
>     1049 }

Based on the way that the ->pages[] array is constructed in
gss_read_proxy_verf(), we know that once the loop encounters a NULL
page pointer, the remaining array elements must also be NULL.

Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Suggested-by: Trond Myklebust <trondmy@hammerspace.com>
Fixes: 5866efa8cbfb ("SUNRPC: Fix svcauth_gss_proxy_init()")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
net/sunrpc/auth_gss/svcauth_gss.c

index 24de9418470036c8af8053472c4557836c369362..96ab50eda9c2eb66b40fb376662aab21a861e9e5 100644 (file)
@@ -1033,17 +1033,11 @@ null_verifier:
 
 static void gss_free_in_token_pages(struct gssp_in_token *in_token)
 {
-       u32 inlen;
        int i;
 
        i = 0;
-       inlen = in_token->page_len;
-       while (inlen) {
-               if (in_token->pages[i])
-                       put_page(in_token->pages[i]);
-               inlen -= inlen > PAGE_SIZE ? PAGE_SIZE : inlen;
-       }
-
+       while (in_token->pages[i])
+               put_page(in_token->pages[i++]);
        kfree(in_token->pages);
        in_token->pages = NULL;
 }