From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 78BC1345748; Mon, 18 Aug 2025 13:16:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755522970; cv=none; b=EywYHJVMPcFDyjrUIOZAwfv15r75c338cug9ESbeyVDTHo7gpa3ItCLWx/Eomk/nemZHzivmsoP5HBLYcUMtj9yCyY1Eici6VoKKW9Av5CXsgnDrxks0pvb6VQz2cfzfVqvZVBz3PGuBfRbSOL94GvU1mhPyi0U3hVLWQYP3vIw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755522970; c=relaxed/simple; bh=s/zvi2+nm5PePU11X31/fZdO63Oj8WbuWQVuCG82dIA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=YjCrqNGqxMcUC7ajTRivXJT236kMIbiKtIFPWl3PxGQocHQvNWhShQbmox4oHWtcSkxvIJUvlcmgxRpI37OoGYCgXrON4YranFGIRHZqJFJMCa/5jcssZDqkpdqyktzwuHX6XSL1g9kGA51XoQCvITnRRAXJ+eHCBH4aiBvDkUw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=xyG2D/Eh; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="xyG2D/Eh" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8F9D0C4CEF1; Mon, 18 Aug 2025 13:16:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1755522970; bh=s/zvi2+nm5PePU11X31/fZdO63Oj8WbuWQVuCG82dIA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xyG2D/EhTJa4h0rR7Ajg7kGoVwsAykJ7s7xKWrVpKuHUYAGjw8xgVPcCXAc0FZJ1J m0B27fXujckzvQLwCibNeFf2WQj8gGy/ndzxuzzoH2NstGKDIfAoMQ+QknFISyZBSt zpYTiP+2cp2tlZJqZyaOzSV47tJhzLpfANzn/bSw= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, lei lu , Jeff Layton , Chuck Lever Subject: [PATCH 6.15 030/515] nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() Date: Mon, 18 Aug 2025 14:40:16 +0200 Message-ID: <20250818124459.615181365@linuxfoundation.org> X-Mailer: git-send-email 2.50.1 In-Reply-To: <20250818124458.334548733@linuxfoundation.org> References: <20250818124458.334548733@linuxfoundation.org> User-Agent: quilt/0.68 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jeff Layton commit 908e4ead7f757504d8b345452730636e298cbf68 upstream. Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM could race with a confirmed client expiring and fail to get a reference. That could later lead to a UAF. Fix this by getting a reference early in the case where there is an extant confirmed client. If that fails then treat it as if there were no confirmed client found at all. In the case where the unconfirmed client is expiring, just fail and return the result from get_client_locked(). Reported-by: lei lu Closes: https://lore.kernel.org/linux-nfs/CAEBF3_b=UvqzNKdnfD_52L05Mqrqui9vZ2eFamgAbV0WG+FNWQ@mail.gmail.com/ Fixes: d20c11d86d8f ("nfsd: Protect session creation and client confirm using client_lock") Cc: stable@vger.kernel.org Signed-off-by: Jeff Layton Signed-off-by: Chuck Lever Signed-off-by: Greg Kroah-Hartman --- fs/nfsd/nfs4state.c | 20 +++++++++++++++----- 1 file changed, 15 insertions(+), 5 deletions(-) --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -4693,10 +4693,16 @@ nfsd4_setclientid_confirm(struct svc_rqs } status = nfs_ok; if (conf) { - old = unconf; - unhash_client_locked(old); - nfsd4_change_callback(conf, &unconf->cl_cb_conn); - } else { + if (get_client_locked(conf) == nfs_ok) { + old = unconf; + unhash_client_locked(old); + nfsd4_change_callback(conf, &unconf->cl_cb_conn); + } else { + conf = NULL; + } + } + + if (!conf) { old = find_confirmed_client_by_name(&unconf->cl_name, nn); if (old) { status = nfserr_clid_inuse; @@ -4713,10 +4719,14 @@ nfsd4_setclientid_confirm(struct svc_rqs } trace_nfsd_clid_replaced(&old->cl_clientid); } + status = get_client_locked(unconf); + if (status != nfs_ok) { + old = NULL; + goto out; + } move_to_confirmed(unconf); conf = unconf; } - get_client_locked(conf); spin_unlock(&nn->client_lock); if (conf == unconf) fsnotify_dentry(conf->cl_nfsd_info_dentry, FS_MODIFY);