]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
cifs: fix session state transition to avoid use-after-free issue
authorWinston Wen <wentao@uniontech.com>
Mon, 26 Jun 2023 03:42:55 +0000 (11:42 +0800)
committerSteve French <stfrench@microsoft.com>
Sat, 1 Jul 2023 05:08:59 +0000 (00:08 -0500)
We switch session state to SES_EXITING without cifs_tcp_ses_lock now,
it may lead to potential use-after-free issue.

Consider the following execution processes:

Thread 1:
__cifs_put_smb_ses()
    spin_lock(&cifs_tcp_ses_lock)
    if (--ses->ses_count > 0)
        spin_unlock(&cifs_tcp_ses_lock)
        return
    spin_unlock(&cifs_tcp_ses_lock)
        ---> **GAP**
    spin_lock(&ses->ses_lock)
    if (ses->ses_status == SES_GOOD)
        ses->ses_status = SES_EXITING
    spin_unlock(&ses->ses_lock)

Thread 2:
cifs_find_smb_ses()
    spin_lock(&cifs_tcp_ses_lock)
    list_for_each_entry(ses, ...)
        spin_lock(&ses->ses_lock)
        if (ses->ses_status == SES_EXITING)
            spin_unlock(&ses->ses_lock)
            continue
        ...
        spin_unlock(&ses->ses_lock)
    if (ret)
        cifs_smb_ses_inc_refcount(ret)
    spin_unlock(&cifs_tcp_ses_lock)

If thread 1 is preempted in the gap and thread 2 start executing, thread 2
will get the session, and soon thread 1 will switch the session state to
SES_EXITING and start releasing it, even though thread 1 had increased the
session's refcount and still uses it.

So switch session state under cifs_tcp_ses_lock to eliminate this gap.

Signed-off-by: Winston Wen <wentao@uniontech.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
fs/smb/client/connect.c

index dab7bc8765078b05f184eff73ec71bb939dc61bc..85dd1b373974a1500ed462ab9f292aa686991ab1 100644 (file)
@@ -1967,15 +1967,16 @@ void __cifs_put_smb_ses(struct cifs_ses *ses)
                spin_unlock(&cifs_tcp_ses_lock);
                return;
        }
+       spin_lock(&ses->ses_lock);
+       if (ses->ses_status == SES_GOOD)
+               ses->ses_status = SES_EXITING;
+       spin_unlock(&ses->ses_lock);
        spin_unlock(&cifs_tcp_ses_lock);
 
        /* ses_count can never go negative */
        WARN_ON(ses->ses_count < 0);
 
        spin_lock(&ses->ses_lock);
-       if (ses->ses_status == SES_GOOD)
-               ses->ses_status = SES_EXITING;
-
        if (ses->ses_status == SES_EXITING && server->ops->logoff) {
                spin_unlock(&ses->ses_lock);
                cifs_free_ipc(ses);