Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2979859imu; Sun, 9 Dec 2018 14:11:11 -0800 (PST) X-Google-Smtp-Source: AFSGD/X50xMDOREeNpvvR4gRLei1D2HDRElkQbd0o+ffmRzMxWmgrqnQAjHN4LKbDOtE/FU1vTue X-Received: by 2002:a17:902:48:: with SMTP id 66mr9627415pla.68.1544393471639; Sun, 09 Dec 2018 14:11:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544393471; cv=none; d=google.com; s=arc-20160816; b=HRoUgKMVVeNnf8+XWzMVWZGHMvDw7Ed5J36+n3dvNRlksMVAql1nmz35DY0ac/T9Ac rP0PYQA07q6tZz9jKkYCzvnkcYlFEBtlgZsA98TQRohaT2tBBVHmE6DHuDBEINRVMHf7 TXmfuUOisODqscvXizv7SkUp8y6shdLKmy2cuUjohZDOpA32dHUWhJIN+fYvEbbdDn9O MjWKpwtz8vANvEtMWbESxsHP8G1HsgMXmy+aalyqAC5WGt+MMGrhyYoAryXKupyCUgGd VkRGcP8C+62pQOq/54nxcfewrmxgFUoS4Txj1IsVbKpGURachJF941AHyTHmYPeCRWS5 9y8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=9QKMAOqlD89kKQo83+YyOAcBJUUiS28OtBLK/sDJyQU=; b=JsjABwZRlJWHMH2xWEOAnxZGN5GbK3AQPgQU0cYDr/T7pz9uCBoB2a010hIdcrCFX/ bVtiCKR4Osj8lwadc8EiAC6GUg7BNGP6Vb9NlR4uDi5hRSzXK6QUnXdGK+Eu4ZYjNGgW 7YyJlzwpGyr9Bs6AxONU21FS0yxT/rIw9Zm9akg+23alP/WJ6DJnZtotmQpDB1NfzX81 gxV1ys6q34mLxclX3bKjIclRK2LQgLeY1U87jRPh3rg90IrFy3vfGpbHEls3Sv1NNAPM c/IUZJlHV4FJDpyzzw8x8sV1valRV+Um3aqQXUNNx7u6umnfauu66nw6/B6hGSNkClSO Q0Lg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j10si8167728pll.179.2018.12.09.14.10.56; Sun, 09 Dec 2018 14:11:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727738AbeLIWIe (ORCPT + 99 others); Sun, 9 Dec 2018 17:08:34 -0500 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:37342 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726494AbeLIWIa (ORCPT ); Sun, 9 Dec 2018 17:08:30 -0500 Received: from pub.yeoldevic.com ([81.174.156.145] helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1gW73C-0002po-9p; Sun, 09 Dec 2018 21:55:46 +0000 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1gW72e-0003Q1-3v; Sun, 09 Dec 2018 21:55:12 +0000 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Matthew Wilcox" , "Mike Christie" , "Martin K. Petersen" Date: Sun, 09 Dec 2018 21:50:33 +0000 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 153/328] iscsi target: fix session creation failure handling In-Reply-To: X-SA-Exim-Connect-IP: 81.174.156.145 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.62-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Mike Christie commit 26abc916a898d34c5ad159315a2f683def3c5555 upstream. The problem is that iscsi_login_zero_tsih_s1 sets conn->sess early in iscsi_login_set_conn_values. If the function fails later like when we alloc the idr it does kfree(sess) and leaves the conn->sess pointer set. iscsi_login_zero_tsih_s1 then returns -Exyz and we then call iscsi_target_login_sess_out and access the freed memory. This patch has iscsi_login_zero_tsih_s1 either completely setup the session or completely tear it down, so later in iscsi_target_login_sess_out we can just check for it being set to the connection. Fixes: 0957627a9960 ("iscsi-target: Fix sess allocation leak in...") Signed-off-by: Mike Christie Acked-by: Martin K. Petersen Signed-off-by: Matthew Wilcox Signed-off-by: Ben Hutchings --- drivers/target/iscsi/iscsi_target_login.c | 35 ++++++++++++++--------- 1 file changed, 21 insertions(+), 14 deletions(-) --- a/drivers/target/iscsi/iscsi_target_login.c +++ b/drivers/target/iscsi/iscsi_target_login.c @@ -323,8 +323,7 @@ static int iscsi_login_zero_tsih_s1( pr_err("idr_alloc() for sess_idr failed\n"); iscsit_tx_login_rsp(conn, ISCSI_STATUS_CLS_TARGET_ERR, ISCSI_LOGIN_STATUS_NO_RESOURCES); - kfree(sess); - return -ENOMEM; + goto free_sess; } sess->creation_time = get_jiffies_64(); @@ -340,20 +339,28 @@ static int iscsi_login_zero_tsih_s1( ISCSI_LOGIN_STATUS_NO_RESOURCES); pr_err("Unable to allocate memory for" " struct iscsi_sess_ops.\n"); - kfree(sess); - return -ENOMEM; + goto remove_idr; } sess->se_sess = transport_init_session(TARGET_PROT_NORMAL); if (IS_ERR(sess->se_sess)) { iscsit_tx_login_rsp(conn, ISCSI_STATUS_CLS_TARGET_ERR, ISCSI_LOGIN_STATUS_NO_RESOURCES); - kfree(sess->sess_ops); - kfree(sess); - return -ENOMEM; + goto free_ops; } return 0; + +free_ops: + kfree(sess->sess_ops); +remove_idr: + spin_lock_bh(&sess_idr_lock); + idr_remove(&sess_idr, sess->session_index); + spin_unlock_bh(&sess_idr_lock); +free_sess: + kfree(sess); + conn->sess = NULL; + return -ENOMEM; } static int iscsi_login_zero_tsih_s2( @@ -1201,13 +1208,13 @@ void iscsi_target_login_sess_out(struct ISCSI_LOGIN_STATUS_INIT_ERR); if (!zero_tsih || !conn->sess) goto old_sess_out; - if (conn->sess->se_sess) - transport_free_session(conn->sess->se_sess); - if (conn->sess->session_index != 0) { - spin_lock_bh(&sess_idr_lock); - idr_remove(&sess_idr, conn->sess->session_index); - spin_unlock_bh(&sess_idr_lock); - } + + transport_free_session(conn->sess->se_sess); + + spin_lock_bh(&sess_idr_lock); + idr_remove(&sess_idr, conn->sess->session_index); + spin_unlock_bh(&sess_idr_lock); + kfree(conn->sess->sess_ops); kfree(conn->sess); conn->sess = NULL;