Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1538369pxb; Mon, 22 Feb 2021 04:49:32 -0800 (PST) X-Google-Smtp-Source: ABdhPJyGlfV9bwafQa158lM3+3RXDBIZhu6Ih4s0TwGHovZh4+H6qpijtsB9sPNih/jfSwlhWCZ4 X-Received: by 2002:a17:906:39c6:: with SMTP id i6mr21454736eje.433.1613998171938; Mon, 22 Feb 2021 04:49:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613998171; cv=none; d=google.com; s=arc-20160816; b=mSbYAGayyPOngyO2mdAcDFFHM3Cbs5CliyTKvoF2ui0Sg7adn9VuI5JA7iE5mDp9IN hjPbP4D3YnXIpSoVm5jQPIiM+G7F+6TM4ERQPmF7xnRyZ7TKyvStdeE6fNC+fFNy1/6S TS4e+lncdtnjQA0brdYm3nBqUDbS8K3GWW10LUALD1t9znss91G4Mi+66zeFn0ZWQnU4 UwbLMoNOTKdMo4d24h2CITUNeVY5eR3zjvDSpU2hOdMIaeoxfW+fGEA2C2JitGIWmygk v4K5r7d1/havH09966qaWgYnpRODPZ7ohLb7nnv4Vc27WQYlfhBW62Xj/F17q0WUDpBL K0ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WiTMIKyelY4HqxhmgUgQhQZYjwYS1aL/Tx41Fae/M4c=; b=TBXHhBZvtsjy05Pj/j1olnOJCrqxqdL8ymkjyLRj+h8Yx8p+x/GgU8X2v5mMYNqfIu oDl2cLMGQv7X4Z1QN6JjpdupGuzUYMzQ/EFOaGnaJP2S5kyMiWXzzLxWDSA14q4zCwDQ 8bkegasaH+YxPNgqKuh17n6TL9mw+11wvJ2zHU1zdA60KA+uX1DELagh5zx55bUow5Cy 5FfMa6vtrT4bjkKqWGsTLyJy8CyF0i8TiFqG4HQ13QsH/Eim5kxp6EhjZORt6meCNlo6 WWFOLuDZkk3wUCuJa+GZ+0EiZEpv7OL2+ZdSdXxEpcqS6R1L+nh40hwUgkW9xC5DjS3g 36xQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WGqU8VkF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e17si12613268edz.241.2021.02.22.04.49.09; Mon, 22 Feb 2021 04:49:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=WGqU8VkF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231481AbhBVMse (ORCPT + 99 others); Mon, 22 Feb 2021 07:48:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:45438 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231148AbhBVMRw (ORCPT ); Mon, 22 Feb 2021 07:17:52 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2CC2664F02; Mon, 22 Feb 2021 12:17:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1613996249; bh=V8TkBACR52x+y+3D3/L9EW9SYCZ+RdN1xOFdWbu/Wcs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=WGqU8VkF5aJCH1ZHNm2LZCjim0T0UEHi4LF+uOlSpoNIfiozx0cz5uZzvJ5y5rLXm C/YEHkNiDyOXk7djpMh//hUszqxV1K5Xw5SaNjjbrLUHcPmq2S+Wm40iJNSKA3anlV Xsh/HwFmoIzOorP/VnH8qO8R1QCSZyy6F2cYH0F4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jan Beulich , Juergen Gross , Julien Grall Subject: [PATCH 4.19 48/50] xen-blkback: fix error handling in xen_blkbk_map() Date: Mon, 22 Feb 2021 13:13:39 +0100 Message-Id: <20210222121027.179477009@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210222121019.925481519@linuxfoundation.org> References: <20210222121019.925481519@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jan Beulich commit 871997bc9e423f05c7da7c9178e62dde5df2a7f8 upstream. The function uses a goto-based loop, which may lead to an earlier error getting discarded by a later iteration. Exit this ad-hoc loop when an error was encountered. The out-of-memory error path additionally fails to fill a structure field looked at by xen_blkbk_unmap_prepare() before inspecting the handle which does get properly set (to BLKBACK_INVALID_HANDLE). Since the earlier exiting from the ad-hoc loop requires the same field filling (invalidation) as that on the out-of-memory path, fold both paths. While doing so, drop the pr_alert(), as extra log messages aren't going to help the situation (the kernel will log oom conditions already anyway). This is XSA-365. Signed-off-by: Jan Beulich Reviewed-by: Juergen Gross Reviewed-by: Julien Grall Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/block/xen-blkback/blkback.c | 24 ++++++++++++++---------- 1 file changed, 14 insertions(+), 10 deletions(-) --- a/drivers/block/xen-blkback/blkback.c +++ b/drivers/block/xen-blkback/blkback.c @@ -850,8 +850,11 @@ again: pages[i]->page = persistent_gnt->page; pages[i]->persistent_gnt = persistent_gnt; } else { - if (get_free_page(ring, &pages[i]->page)) - goto out_of_memory; + if (get_free_page(ring, &pages[i]->page)) { + put_free_pages(ring, pages_to_gnt, segs_to_map); + ret = -ENOMEM; + goto out; + } addr = vaddr(pages[i]->page); pages_to_gnt[segs_to_map] = pages[i]->page; pages[i]->persistent_gnt = NULL; @@ -935,17 +938,18 @@ next: } segs_to_map = 0; last_map = map_until; - if (map_until != num) + if (!ret && map_until != num) goto again; - return ret; - -out_of_memory: - pr_alert("%s: out of memory\n", __func__); - put_free_pages(ring, pages_to_gnt, segs_to_map); - for (i = last_map; i < num; i++) +out: + for (i = last_map; i < num; i++) { + /* Don't zap current batch's valid persistent grants. */ + if(i >= last_map + segs_to_map) + pages[i]->persistent_gnt = NULL; pages[i]->handle = BLKBACK_INVALID_HANDLE; - return -ENOMEM; + } + + return ret; } static int xen_blkbk_map_seg(struct pending_req *pending_req)