scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()

In iscsit_dec_conn_usage_count(), the function calls complete() while
holding the conn->conn_usage_lock. As soon as complete() is invoked, the
waiter (such as iscsit_close_connection()) may wake up and proceed to free
the iscsit_conn structure.

If the waiter frees the memory before the current thread reaches
spin_unlock_bh(), it results in a KASAN slab-use-after-free as the function
attempts to release a lock within the already-freed connection structure.

Fix this by releasing the spinlock before calling complete().

Signed-off-by: Maurizio Lombardi <mlombard@redhat.com>
Reported-by: Zhaojuan Guo <zguo@redhat.com>
Reviewed-by: Mike Christie <michael.christie@oracle.com>
Link: https://patch.msgid.link/20260112165352.138606-2-mlombard@redhat.com
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>

authored by Maurizio Lombardi and committed by Martin K. Petersen 9411a89e fe2f8ad6

+4 -1
+4 -1
drivers/target/iscsi/iscsi_target_util.c
··· 810 spin_lock_bh(&conn->conn_usage_lock); 811 conn->conn_usage_count--; 812 813 - if (!conn->conn_usage_count && conn->conn_waiting_on_uc) 814 complete(&conn->conn_waiting_on_uc_comp); 815 816 spin_unlock_bh(&conn->conn_usage_lock); 817 }
··· 810 spin_lock_bh(&conn->conn_usage_lock); 811 conn->conn_usage_count--; 812 813 + if (!conn->conn_usage_count && conn->conn_waiting_on_uc) { 814 + spin_unlock_bh(&conn->conn_usage_lock); 815 complete(&conn->conn_waiting_on_uc_comp); 816 + return; 817 + } 818 819 spin_unlock_bh(&conn->conn_usage_lock); 820 }