Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1811815imm; Mon, 3 Sep 2018 10:03:56 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYk1VpV2pWsxGtqVRKwOWxjziusF1E1/VVQD7R0NQjZ9kl21GJWJsPyOBrf10nGJ50gn2G3 X-Received: by 2002:a63:7058:: with SMTP id a24-v6mr21347669pgn.206.1535994236706; Mon, 03 Sep 2018 10:03:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535994236; cv=none; d=google.com; s=arc-20160816; b=dOqtZDQ6XoNbd7oQ+97FOwCbsyJJCuo5nGXn7SMD6yfx212P1TH5zCrret5d0x1PcG uNacx/w3eLW/YYO/oRqXJIhOvsMipEXigS7AktTvVmxKShV3sbBn6oLpDvA/UNy8kdWZ /+PDYQvFJBEL4fHrdtZpdtxKwZOlJK1yUv0yeIi3bUMZmM++iZ0E2UviSWr+lEz3dBhn 94mIPOctkIJUW4N1ivh/Qm2nov1tMVwNHCnYd4IIQcJBU9/69c74/qyC+TR0aqwjw5GP 3/EizGmKxktmypTSEn65PCg0cTrZJ/V/wCGVkfWCZTHmFXMLvGxaLdIZOcoCYARsrwna tTzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=wIkYSuAN9ku1IkCvwhTTwqPcPzRAjfuq6pD5kC7Iz0E=; b=FiRHjxAMZS4mpSBEqbRH+TukAp0CzOvX6T7QsNqDCIBBr8CQiIx6QTpAMwxGYOfaWI DGE4gIliJYKJibcppdptHsMy/XX0UjoPZqCxUFArI6qZPHQZhrFkJNZYIcWtZRXdPTYY 03g/JG39decI9gtjV2Wn9W0PsonIvgJLvwL6uIwIMv8dradDgIzpkhKOLtv7dxInueDC b7lhxi0iq65W6meL53IOGVvfwGtJE64JQTou6aCEY6/ShfIwgB+J8FIyfGF7iJ8JoqN2 VY1HXsC9RZqtVbeQ8NdzB7M35/8d4JLteBTSVCRGTQrgG7Wuq80EkIrwmOg3ul1Pl6WQ lrKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l9-v6si17977542pgg.622.2018.09.03.10.03.41; Mon, 03 Sep 2018 10:03:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729049AbeICVXi (ORCPT + 99 others); Mon, 3 Sep 2018 17:23:38 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38966 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728040AbeICVXh (ORCPT ); Mon, 3 Sep 2018 17:23:37 -0400 Received: from localhost (ip-213-127-74-90.ip.prioritytelecom.net [213.127.74.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 17A52CEE; Mon, 3 Sep 2018 17:02:36 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mike Christie , "Martin K. Petersen" , Matthew Wilcox Subject: [PATCH 4.4 79/80] iscsi target: fix session creation failure handling Date: Mon, 3 Sep 2018 18:49:57 +0200 Message-Id: <20180903164937.305035745@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180903164934.171677301@linuxfoundation.org> References: <20180903164934.171677301@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mike Christie commit 26abc916a898d34c5ad159315a2f683def3c5555 upstream. The problem is that iscsi_login_zero_tsih_s1 sets conn->sess early in iscsi_login_set_conn_values. If the function fails later like when we alloc the idr it does kfree(sess) and leaves the conn->sess pointer set. iscsi_login_zero_tsih_s1 then returns -Exyz and we then call iscsi_target_login_sess_out and access the freed memory. This patch has iscsi_login_zero_tsih_s1 either completely setup the session or completely tear it down, so later in iscsi_target_login_sess_out we can just check for it being set to the connection. Cc: stable@vger.kernel.org Fixes: 0957627a9960 ("iscsi-target: Fix sess allocation leak in...") Signed-off-by: Mike Christie Acked-by: Martin K. Petersen Signed-off-by: Matthew Wilcox Signed-off-by: Greg Kroah-Hartman --- drivers/target/iscsi/iscsi_target_login.c | 35 ++++++++++++++++++------------ 1 file changed, 21 insertions(+), 14 deletions(-) --- a/drivers/target/iscsi/iscsi_target_login.c +++ b/drivers/target/iscsi/iscsi_target_login.c @@ -323,8 +323,7 @@ static int iscsi_login_zero_tsih_s1( pr_err("idr_alloc() for sess_idr failed\n"); iscsit_tx_login_rsp(conn, ISCSI_STATUS_CLS_TARGET_ERR, ISCSI_LOGIN_STATUS_NO_RESOURCES); - kfree(sess); - return -ENOMEM; + goto free_sess; } sess->creation_time = get_jiffies_64(); @@ -340,20 +339,28 @@ static int iscsi_login_zero_tsih_s1( ISCSI_LOGIN_STATUS_NO_RESOURCES); pr_err("Unable to allocate memory for" " struct iscsi_sess_ops.\n"); - kfree(sess); - return -ENOMEM; + goto remove_idr; } sess->se_sess = transport_init_session(TARGET_PROT_NORMAL); if (IS_ERR(sess->se_sess)) { iscsit_tx_login_rsp(conn, ISCSI_STATUS_CLS_TARGET_ERR, ISCSI_LOGIN_STATUS_NO_RESOURCES); - kfree(sess->sess_ops); - kfree(sess); - return -ENOMEM; + goto free_ops; } return 0; + +free_ops: + kfree(sess->sess_ops); +remove_idr: + spin_lock_bh(&sess_idr_lock); + idr_remove(&sess_idr, sess->session_index); + spin_unlock_bh(&sess_idr_lock); +free_sess: + kfree(sess); + conn->sess = NULL; + return -ENOMEM; } static int iscsi_login_zero_tsih_s2( @@ -1142,13 +1149,13 @@ void iscsi_target_login_sess_out(struct ISCSI_LOGIN_STATUS_INIT_ERR); if (!zero_tsih || !conn->sess) goto old_sess_out; - if (conn->sess->se_sess) - transport_free_session(conn->sess->se_sess); - if (conn->sess->session_index != 0) { - spin_lock_bh(&sess_idr_lock); - idr_remove(&sess_idr, conn->sess->session_index); - spin_unlock_bh(&sess_idr_lock); - } + + transport_free_session(conn->sess->se_sess); + + spin_lock_bh(&sess_idr_lock); + idr_remove(&sess_idr, conn->sess->session_index); + spin_unlock_bh(&sess_idr_lock); + kfree(conn->sess->sess_ops); kfree(conn->sess); conn->sess = NULL;