[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170106213909.182858812@linuxfoundation.org>
Date: Fri, 6 Jan 2017 22:44:40 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-kernel@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
stable@...r.kernel.org, Bryant G Ly <bgly@...ibm.com>,
Andy Grover <agrover@...hat.com>,
Bart Van Assche <bart.vanassche@...disk.com>
Subject: [PATCH 4.4 55/58] target/user: Fix use-after-free of tcmu_cmds if they are expired
4.4-stable review patch. If anyone has any objections, please let me know.
------------------
From: Andy Grover <agrover@...hat.com>
commit d0905ca757bc40bd1ebc261a448a521b064777d7 upstream.
Don't free the cmd in tcmu_check_expired_cmd, it's still referenced by
an entry in our cmd_id->cmd idr. If userspace ever resumes processing,
tcmu_handle_completions() will use the now-invalid cmd pointer.
Instead, don't free cmd. It will be freed by tcmu_handle_completion() if
userspace ever recovers, or tcmu_free_device if not.
Reported-by: Bryant G Ly <bgly@...ibm.com>
Tested-by: Bryant G Ly <bgly@...ibm.com>
Signed-off-by: Andy Grover <agrover@...hat.com>
Signed-off-by: Bart Van Assche <bart.vanassche@...disk.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
---
drivers/target/target_core_user.c | 2 --
1 file changed, 2 deletions(-)
--- a/drivers/target/target_core_user.c
+++ b/drivers/target/target_core_user.c
@@ -645,8 +645,6 @@ static int tcmu_check_expired_cmd(int id
target_complete_cmd(cmd->se_cmd, SAM_STAT_CHECK_CONDITION);
cmd->se_cmd = NULL;
- kmem_cache_free(tcmu_cmd_cache, cmd);
-
return 0;
}
Powered by blists - more mailing lists