Re: [PATCH 07/21] target: Fix a use-after-free in core_tpg_del_initiator_node_acl()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jan 05, 2016 at 02:48:57PM +0100, Bart Van Assche wrote:
> Target drivers like ib_srpt can call transport_deregister_session()
> while core_tpg_del_initiator_node_acl() is processing sess_acl_list.
> Avoid that this scenario triggers a use-after-free by postponing
> freeing a session object until core_tpg_del_initiator_node_acl() has
> finished accessing that session object. Keep the se_tpg and
> fabric_sess_ptr member variables as long as the session object
> exists.

Wouldn't the simple patch below also fix that issue?


diff --git a/drivers/target/target_core_tpg.c b/drivers/target/target_core_tpg.c
index 5fb9dd7..7fb63ab 100644
--- a/drivers/target/target_core_tpg.c
+++ b/drivers/target/target_core_tpg.c
@@ -308,7 +308,6 @@ struct se_node_acl *core_tpg_add_initiator_node_acl(
 void core_tpg_del_initiator_node_acl(struct se_node_acl *acl)
 {
 	struct se_portal_group *tpg = acl->se_tpg;
-	LIST_HEAD(sess_list);
 	struct se_session *sess, *sess_tmp;
 	unsigned long flags;
 	int rc;
@@ -323,26 +322,23 @@ void core_tpg_del_initiator_node_acl(struct se_node_acl *acl)
 
 	spin_lock_irqsave(&acl->nacl_sess_lock, flags);
 	acl->acl_stop = 1;
-
+restart:
 	list_for_each_entry_safe(sess, sess_tmp, &acl->acl_sess_list,
 				sess_acl_list) {
 		if (sess->sess_tearing_down != 0)
 			continue;
-
-		target_get_session(sess);
-		list_move(&sess->sess_acl_list, &sess_list);
-	}
-	spin_unlock_irqrestore(&acl->nacl_sess_lock, flags);
-
-	list_for_each_entry_safe(sess, sess_tmp, &sess_list, sess_acl_list) {
+	
 		list_del(&sess->sess_acl_list);
+		spin_unlock_irqrestore(&acl->nacl_sess_lock, flags);
 
 		rc = tpg->se_tpg_tfo->shutdown_session(sess);
-		target_put_session(sess);
-		if (!rc)
-			continue;
-		target_put_session(sess);
+		if (rc)
+			target_put_session(sess);
+		spin_lock_irqsave(&acl->nacl_sess_lock, flags);
+		goto restart;
 	}
+	spin_unlock_irqrestore(&acl->nacl_sess_lock, flags);
+
 	target_put_nacl(acl);
 	/*
 	 * Wait for last target_put_nacl() to complete in target_complete_nacl()
--
To unsubscribe from this list: send the line "unsubscribe target-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux SCSI]     [Kernel Newbies]     [Linux SCSI Target Infrastructure]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Linux IIO]     [Device Mapper]

  Powered by Linux