On Wed, 30 Mar 2011 14:54:27 +0200
Sean Finney <[email protected]> wrote:

> To keep strings passed to cifs_parse_mount_options re-usable (which
> is needed to clean up the DFS referral handling), tokenize a copy
> of the mount options instead.  Since we're not on the critical path
> here and cleanup is relatively easy, it shouldn't be a problem (and
> it is a bit simpler than trying to implement something smarter).
> ---
>  fs/cifs/connect.c |   70 ++++++++++++++++++++++++++++++----------------------
>  1 files changed, 40 insertions(+), 30 deletions(-)
> 
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index 9425c7b..7d1d0e9 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -807,11 +807,12 @@ extract_hostname(const char *unc)
>  }
>  
>  static int
> -cifs_parse_mount_options(char *options, const char *devname,
> +cifs_parse_mount_options(const char *mountdata, const char *devname,
>                        struct smb_vol *vol)
>  {
>       char *value;
>       char *data;
> +     char *mountdata_copy, *options;
>       unsigned int  temp_len, i, j;
>       char separator[2];
>       short int override_uid = -1;
> @@ -851,9 +852,14 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>  
>       vol->actimeo = CIFS_DEF_ACTIMEO;
>  
> -     if (!options)
> -             return 1;
> +     if (!mountdata)
> +             goto cifs_parse_mount_err;
> +
> +     mountdata_copy = kstrdup(mountdata, GFP_KERNEL);
> +     if (!mountdata_copy)
> +             goto cifs_parse_mount_err;
>  

I worry (slightly) about bounds checking here. Yes, I know we do a poor
job of that in this code, but this is probably a good time to fix that.
I'm pretty sure that mount options are limited to a page. Maybe turn
the above into a kstrndup() and limit it to PAGE_CACHE_SIZE?

Might not hurt also to explicitly set the last byte in the allocation
to 0.

> +     options = mountdata_copy;
>       if (strncmp(options, "sep=", 4) == 0) {
>               if (options[4] != 0) {
>                       separator[0] = options[4];
> @@ -878,7 +884,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       if (!value) {
>                               printk(KERN_WARNING
>                                      "CIFS: invalid or missing username\n");
> -                             return 1;       /* needs_arg; */
> +                             goto cifs_parse_mount_err;
>                       } else if (!*value) {
>                               /* null user, ie anonymous, authentication */
>                               vol->nullauth = 1;
> @@ -888,7 +894,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               vol->username = value;
>                       } else {
>                               printk(KERN_WARNING "CIFS: username too 
> long\n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (strnicmp(data, "pass", 4) == 0) {
>                       if (!value) {
> @@ -951,7 +957,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               if (vol->password == NULL) {
>                                       printk(KERN_WARNING "CIFS: no memory "
>                                                           "for password\n");
> -                                     return 1;
> +                                     goto cifs_parse_mount_err;
>                               }
>                               for (i = 0, j = 0; i < temp_len; i++, j++) {
>                                       vol->password[j] = value[i];
> @@ -967,7 +973,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               if (vol->password == NULL) {
>                                       printk(KERN_WARNING "CIFS: no memory "
>                                                           "for password\n");
> -                                     return 1;
> +                                     goto cifs_parse_mount_err;
>                               }
>                               strcpy(vol->password, value);
>                       }
> @@ -981,7 +987,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       } else {
>                               printk(KERN_WARNING "CIFS: ip address "
>                                                   "too long\n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (strnicmp(data, "sec", 3) == 0) {
>                       if (!value || !*value) {
> @@ -994,7 +1000,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               /* vol->secFlg |= CIFSSEC_MUST_SEAL |
>                                       CIFSSEC_MAY_KRB5; */
>                               cERROR(1, "Krb5 cifs privacy not supported");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       } else if (strnicmp(value, "krb5", 4) == 0) {
>                               vol->secFlg |= CIFSSEC_MAY_KRB5;
>                       } else if (strnicmp(value, "ntlmsspi", 8) == 0) {
> @@ -1024,7 +1030,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               vol->nullauth = 1;
>                       } else {
>                               cERROR(1, "bad security option: %s", value);
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (strnicmp(data, "vers", 3) == 0) {
>                       if (!value || !*value) {
> @@ -1048,12 +1054,12 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       if (!value || !*value) {
>                               printk(KERN_WARNING "CIFS: invalid path to "
>                                                   "network resource\n");
> -                             return 1;       /* needs_arg; */
> +                             goto cifs_parse_mount_err;
>                       }
>                       if ((temp_len = strnlen(value, 300)) < 300) {
>                               vol->UNC = kmalloc(temp_len+1, GFP_KERNEL);
>                               if (vol->UNC == NULL)
> -                                     return 1;
> +                                     goto cifs_parse_mount_err;
>                               strcpy(vol->UNC, value);
>                               if (strncmp(vol->UNC, "//", 2) == 0) {
>                                       vol->UNC[0] = '\\';
> @@ -1062,17 +1068,17 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                                       printk(KERN_WARNING
>                                              "CIFS: UNC Path does not begin "
>                                              "with // or \\\\ \n");
> -                                     return 1;
> +                                     goto cifs_parse_mount_err;
>                               }
>                       } else {
>                               printk(KERN_WARNING "CIFS: UNC name too 
> long\n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if ((strnicmp(data, "domain", 3) == 0)
>                          || (strnicmp(data, "workgroup", 5) == 0)) {
>                       if (!value || !*value) {
>                               printk(KERN_WARNING "CIFS: invalid domain 
> name\n");
> -                             return 1;       /* needs_arg; */
> +                             goto cifs_parse_mount_err;
>                       }
>                       /* BB are there cases in which a comma can be valid in
>                       a domain name and need special handling? */
> @@ -1082,7 +1088,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       } else {
>                               printk(KERN_WARNING "CIFS: domain name too "
>                                                   "long\n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (strnicmp(data, "srcaddr", 7) == 0) {
>                       vol->srcaddr.ss_family = AF_UNSPEC;
> @@ -1090,7 +1096,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       if (!value || !*value) {
>                               printk(KERN_WARNING "CIFS: srcaddr value"
>                                      " not specified.\n");
> -                             return 1;       /* needs_arg; */
> +                             goto cifs_parse_mount_err;
>                       }
>                       i = cifs_convert_address((struct sockaddr 
> *)&vol->srcaddr,
>                                                value, strlen(value));
> @@ -1098,20 +1104,20 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               printk(KERN_WARNING "CIFS:  Could not parse"
>                                      " srcaddr: %s\n",
>                                      value);
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (strnicmp(data, "prefixpath", 10) == 0) {
>                       if (!value || !*value) {
>                               printk(KERN_WARNING
>                                       "CIFS: invalid path prefix\n");
> -                             return 1;       /* needs_argument */
> +                             goto cifs_parse_mount_err;
>                       }
>                       if ((temp_len = strnlen(value, 1024)) < 1024) {
>                               if (value[0] != '/')
>                                       temp_len++;  /* missing leading slash */
>                               vol->prepath = kmalloc(temp_len+1, GFP_KERNEL);
>                               if (vol->prepath == NULL)
> -                                     return 1;
> +                                     goto cifs_parse_mount_err;
>                               if (value[0] != '/') {
>                                       vol->prepath[0] = '/';
>                                       strcpy(vol->prepath+1, value);
> @@ -1120,13 +1126,13 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               cFYI(1, "prefix path %s", vol->prepath);
>                       } else {
>                               printk(KERN_WARNING "CIFS: prefix too long\n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (strnicmp(data, "iocharset", 9) == 0) {
>                       if (!value || !*value) {
>                               printk(KERN_WARNING "CIFS: invalid iocharset "
>                                                   "specified\n");
> -                             return 1;       /* needs_arg; */
> +                             goto cifs_parse_mount_err;
>                       }
>                       if (strnlen(value, 65) < 65) {
>                               if (strnicmp(value, "default", 7))
> @@ -1137,7 +1143,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       } else {
>                               printk(KERN_WARNING "CIFS: iocharset name "
>                                                   "too long.\n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>               } else if (!strnicmp(data, "uid", 3) && value && *value) {
>                       vol->linux_uid = simple_strtoul(value, &value, 0);
> @@ -1250,7 +1256,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                               if (vol->actimeo > CIFS_MAX_ACTIMEO) {
>                                       cERROR(1, "CIFS: attribute cache"
>                                                       "timeout too large");
> -                                     return 1;
> +                                     goto cifs_parse_mount_err;
>                               }
>                       }
>               } else if (strnicmp(data, "credentials", 4) == 0) {
> @@ -1394,7 +1400,7 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>  #ifndef CONFIG_CIFS_FSCACHE
>                       cERROR(1, "FS-Cache support needs CONFIG_CIFS_FSCACHE"
>                                 "kernel config option set");
> -                     return 1;
> +                     goto cifs_parse_mount_err;
>  #endif
>                       vol->fsc = true;
>               } else if (strnicmp(data, "mfsymlinks", 10) == 0) {
> @@ -1409,12 +1415,12 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>               if (devname == NULL) {
>                       printk(KERN_WARNING "CIFS: Missing UNC name for mount "
>                                               "target\n");
> -                     return 1;
> +                     goto cifs_parse_mount_err;
>               }
>               if ((temp_len = strnlen(devname, 300)) < 300) {
>                       vol->UNC = kmalloc(temp_len+1, GFP_KERNEL);
>                       if (vol->UNC == NULL)
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       strcpy(vol->UNC, devname);
>                       if (strncmp(vol->UNC, "//", 2) == 0) {
>                               vol->UNC[0] = '\\';
> @@ -1422,21 +1428,21 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                       } else if (strncmp(vol->UNC, "\\\\", 2) != 0) {
>                               printk(KERN_WARNING "CIFS: UNC Path does not "
>                                                   "begin with // or \\\\ \n");
> -                             return 1;
> +                             goto cifs_parse_mount_err;
>                       }
>                       value = strpbrk(vol->UNC+2, "/\\");
>                       if (value)
>                               *value = '\\';
>               } else {
>                       printk(KERN_WARNING "CIFS: UNC name too long\n");
> -                     return 1;
> +                     goto cifs_parse_mount_err;
>               }
>       }
>  
>       if (vol->multiuser && !(vol->secFlg & CIFSSEC_MAY_KRB5)) {
>               cERROR(1, "Multiuser mounts currently require krb5 "
>                         "authentication!");
> -             return 1;
> +             goto cifs_parse_mount_err;
>       }
>  
>       if (vol->UNCip == NULL)
> @@ -1455,6 +1461,10 @@ cifs_parse_mount_options(char *options, const char 
> *devname,
>                                  "specified with no gid= option.\n");
>  
>       return 0;

        ^^^^^^^^^^
In the event that there's no error, what frees mountdata_copy here?

> +
> +cifs_parse_mount_err:
> +     kfree(mountdata_copy);
> +     return 1;
>  }
>  
>  /** Returns true if srcaddr isn't specified and rhs isn't
-- 
Jeff Layton <[email protected]>
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to