linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
@ 2021-11-24 14:37 David Howells
  2021-11-24 14:37 ` [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() David Howells
                   ` (4 more replies)
  0 siblings, 5 replies; 9+ messages in thread
From: David Howells @ 2021-11-24 14:37 UTC (permalink / raw)
  To: Eiichi Tsukata
  Cc: Marc Dionne, linux-afs, dhowells, kuba, netdev, linux-kernel

From: Eiichi Tsukata <eiichi.tsukata@nutanix.com>

Need to call rxrpc_put_peer() for bundle candidate before kfree() as it
holds a ref to rxrpc_peer.

[DH: v2: Changed to abstract out the bundle freeing code into a function]

Fixes: 245500d853e9 ("rxrpc: Rewrite the client connection manager")
Signed-off-by: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: linux-afs@lists.infradead.org
Link: https://lore.kernel.org/r/20211121041608.133740-1-eiichi.tsukata@nutanix.com/ # v1
---

 net/rxrpc/conn_client.c |   14 +++++++++-----
 1 file changed, 9 insertions(+), 5 deletions(-)

diff --git a/net/rxrpc/conn_client.c b/net/rxrpc/conn_client.c
index dbea0bfee48e..8120138dac01 100644
--- a/net/rxrpc/conn_client.c
+++ b/net/rxrpc/conn_client.c
@@ -135,16 +135,20 @@ struct rxrpc_bundle *rxrpc_get_bundle(struct rxrpc_bundle *bundle)
 	return bundle;
 }
 
+static void rxrpc_free_bundle(struct rxrpc_bundle *bundle)
+{
+	rxrpc_put_peer(bundle->params.peer);
+	kfree(bundle);
+}
+
 void rxrpc_put_bundle(struct rxrpc_bundle *bundle)
 {
 	unsigned int d = bundle->debug_id;
 	unsigned int u = atomic_dec_return(&bundle->usage);
 
 	_debug("PUT B=%x %u", d, u);
-	if (u == 0) {
-		rxrpc_put_peer(bundle->params.peer);
-		kfree(bundle);
-	}
+	if (u == 0)
+		rxrpc_free_bundle(bundle);
 }
 
 /*
@@ -328,7 +332,7 @@ static struct rxrpc_bundle *rxrpc_look_up_bundle(struct rxrpc_conn_parameters *c
 	return candidate;
 
 found_bundle_free:
-	kfree(candidate);
+	rxrpc_free_bundle(candidate);
 found_bundle:
 	rxrpc_get_bundle(bundle);
 	spin_unlock(&local->client_bundles_lock);



^ permalink raw reply related	[flat|nested] 9+ messages in thread

* [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
  2021-11-24 14:37 [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() David Howells
@ 2021-11-24 14:37 ` David Howells
  2021-11-26 13:15   ` Marc Dionne
  2021-11-26  3:27 ` [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() Jakub Kicinski
                   ` (3 subsequent siblings)
  4 siblings, 1 reply; 9+ messages in thread
From: David Howells @ 2021-11-24 14:37 UTC (permalink / raw)
  To: Eiichi Tsukata
  Cc: Marc Dionne, linux-afs, dhowells, kuba, netdev, linux-kernel

From: Eiichi Tsukata <eiichi.tsukata@nutanix.com>

Need to call rxrpc_put_local() for peer candidate before kfree() as it
holds a ref to rxrpc_local.

[DH: v2: Changed to abstract the peer freeing code out into a function]

Fixes: 9ebeddef58c4 ("rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record")
Signed-off-by: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: linux-afs@lists.infradead.org
Link: https://lore.kernel.org/all/20211121041608.133740-2-eiichi.tsukata@nutanix.com/ # v1
---

 net/rxrpc/peer_object.c |   14 +++++++++-----
 1 file changed, 9 insertions(+), 5 deletions(-)

diff --git a/net/rxrpc/peer_object.c b/net/rxrpc/peer_object.c
index 68396d052052..0298fe2ad6d3 100644
--- a/net/rxrpc/peer_object.c
+++ b/net/rxrpc/peer_object.c
@@ -299,6 +299,12 @@ static struct rxrpc_peer *rxrpc_create_peer(struct rxrpc_sock *rx,
 	return peer;
 }
 
+static void rxrpc_free_peer(struct rxrpc_peer *peer)
+{
+	rxrpc_put_local(peer->local);
+	kfree_rcu(peer, rcu);
+}
+
 /*
  * Set up a new incoming peer.  There shouldn't be any other matching peers
  * since we've already done a search in the list from the non-reentrant context
@@ -365,7 +371,7 @@ struct rxrpc_peer *rxrpc_lookup_peer(struct rxrpc_sock *rx,
 		spin_unlock_bh(&rxnet->peer_hash_lock);
 
 		if (peer)
-			kfree(candidate);
+			rxrpc_free_peer(candidate);
 		else
 			peer = candidate;
 	}
@@ -420,8 +426,7 @@ static void __rxrpc_put_peer(struct rxrpc_peer *peer)
 	list_del_init(&peer->keepalive_link);
 	spin_unlock_bh(&rxnet->peer_hash_lock);
 
-	rxrpc_put_local(peer->local);
-	kfree_rcu(peer, rcu);
+	rxrpc_free_peer(peer);
 }
 
 /*
@@ -457,8 +462,7 @@ void rxrpc_put_peer_locked(struct rxrpc_peer *peer)
 	if (n == 0) {
 		hash_del_rcu(&peer->hash_link);
 		list_del_init(&peer->keepalive_link);
-		rxrpc_put_local(peer->local);
-		kfree_rcu(peer, rcu);
+		rxrpc_free_peer(peer);
 	}
 }
 



^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
  2021-11-24 14:37 [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() David Howells
  2021-11-24 14:37 ` [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() David Howells
@ 2021-11-26  3:27 ` Jakub Kicinski
  2021-11-26  8:05 ` David Howells
                   ` (2 subsequent siblings)
  4 siblings, 0 replies; 9+ messages in thread
From: Jakub Kicinski @ 2021-11-26  3:27 UTC (permalink / raw)
  To: David Howells
  Cc: Eiichi Tsukata, Marc Dionne, linux-afs, netdev, linux-kernel

On Wed, 24 Nov 2021 14:37:33 +0000 David Howells wrote:
> From: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
> 
> Need to call rxrpc_put_peer() for bundle candidate before kfree() as it
> holds a ref to rxrpc_peer.
> 
> [DH: v2: Changed to abstract out the bundle freeing code into a function]
> 
> Fixes: 245500d853e9 ("rxrpc: Rewrite the client connection manager")
> Signed-off-by: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
> Signed-off-by: David Howells <dhowells@redhat.com>
> cc: Marc Dionne <marc.dionne@auristor.com>
> cc: linux-afs@lists.infradead.org
> Link: https://lore.kernel.org/r/20211121041608.133740-1-eiichi.tsukata@nutanix.com/ # v1

Are these supposed to go to net? They are addressed To: the author.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
  2021-11-24 14:37 [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() David Howells
  2021-11-24 14:37 ` [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() David Howells
  2021-11-26  3:27 ` [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() Jakub Kicinski
@ 2021-11-26  8:05 ` David Howells
  2021-11-26  8:34   ` Eiichi Tsukata
  2021-11-29 15:40   ` David Howells
  2021-11-26 13:12 ` Marc Dionne
  2021-11-29 15:53 ` David Howells
  4 siblings, 2 replies; 9+ messages in thread
From: David Howells @ 2021-11-26  8:05 UTC (permalink / raw)
  To: Jakub Kicinski
  Cc: dhowells, Eiichi Tsukata, Marc Dionne, linux-afs, netdev, linux-kernel

Jakub Kicinski <kuba@kernel.org> wrote:

> Are these supposed to go to net? They are addressed To: the author.

I'm hoping the author rechecks/reviews them.  I commented on his original
submission that I thought they could be done slightly differently.

David


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
  2021-11-26  8:05 ` David Howells
@ 2021-11-26  8:34   ` Eiichi Tsukata
  2021-11-29 15:40   ` David Howells
  1 sibling, 0 replies; 9+ messages in thread
From: Eiichi Tsukata @ 2021-11-26  8:34 UTC (permalink / raw)
  To: David Howells
  Cc: Jakub Kicinski, Marc Dionne, linux-afs, netdev, linux-kernel



> On Nov 26, 2021, at 17:05, David Howells <dhowells@redhat.com> wrote:
> 
> Jakub Kicinski <kuba@kernel.org> wrote:
> 
>> Are these supposed to go to net? They are addressed To: the author.
> 
> I'm hoping the author rechecks/reviews them.  I commented on his original
> submission that I thought they could be done slightly differently.
> 

Thanks, I’ve tested them with my environment. Looks good.

Eiichi

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
  2021-11-24 14:37 [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() David Howells
                   ` (2 preceding siblings ...)
  2021-11-26  8:05 ` David Howells
@ 2021-11-26 13:12 ` Marc Dionne
  2021-11-29 15:53 ` David Howells
  4 siblings, 0 replies; 9+ messages in thread
From: Marc Dionne @ 2021-11-26 13:12 UTC (permalink / raw)
  To: David Howells
  Cc: Eiichi Tsukata, linux-afs, Jakub Kicinski, netdev,
	Linux Kernel Mailing List

On Wed, Nov 24, 2021 at 10:37 AM David Howells <dhowells@redhat.com> wrote:
>
> From: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
>
> Need to call rxrpc_put_peer() for bundle candidate before kfree() as it
> holds a ref to rxrpc_peer.
>
> [DH: v2: Changed to abstract out the bundle freeing code into a function]
>
> Fixes: 245500d853e9 ("rxrpc: Rewrite the client connection manager")
> Signed-off-by: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
> Signed-off-by: David Howells <dhowells@redhat.com>
> cc: Marc Dionne <marc.dionne@auristor.com>
> cc: linux-afs@lists.infradead.org
> Link: https://lore.kernel.org/r/20211121041608.133740-1-eiichi.tsukata@nutanix.com/ # v1
> ---
>
>  net/rxrpc/conn_client.c |   14 +++++++++-----
>  1 file changed, 9 insertions(+), 5 deletions(-)
>
> diff --git a/net/rxrpc/conn_client.c b/net/rxrpc/conn_client.c
> index dbea0bfee48e..8120138dac01 100644
> --- a/net/rxrpc/conn_client.c
> +++ b/net/rxrpc/conn_client.c
> @@ -135,16 +135,20 @@ struct rxrpc_bundle *rxrpc_get_bundle(struct rxrpc_bundle *bundle)
>         return bundle;
>  }
>
> +static void rxrpc_free_bundle(struct rxrpc_bundle *bundle)
> +{
> +       rxrpc_put_peer(bundle->params.peer);
> +       kfree(bundle);
> +}
> +
>  void rxrpc_put_bundle(struct rxrpc_bundle *bundle)
>  {
>         unsigned int d = bundle->debug_id;
>         unsigned int u = atomic_dec_return(&bundle->usage);
>
>         _debug("PUT B=%x %u", d, u);
> -       if (u == 0) {
> -               rxrpc_put_peer(bundle->params.peer);
> -               kfree(bundle);
> -       }
> +       if (u == 0)
> +               rxrpc_free_bundle(bundle);
>  }
>
>  /*
> @@ -328,7 +332,7 @@ static struct rxrpc_bundle *rxrpc_look_up_bundle(struct rxrpc_conn_parameters *c
>         return candidate;
>
>  found_bundle_free:
> -       kfree(candidate);
> +       rxrpc_free_bundle(candidate);
>  found_bundle:
>         rxrpc_get_bundle(bundle);
>         spin_unlock(&local->client_bundles_lock);

Reviewed-by: Marc Dionne <marc.dionne@auristor.com>

Marc

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
  2021-11-24 14:37 ` [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() David Howells
@ 2021-11-26 13:15   ` Marc Dionne
  0 siblings, 0 replies; 9+ messages in thread
From: Marc Dionne @ 2021-11-26 13:15 UTC (permalink / raw)
  To: David Howells
  Cc: Eiichi Tsukata, linux-afs, Jakub Kicinski, netdev,
	Linux Kernel Mailing List

On Wed, Nov 24, 2021 at 10:38 AM David Howells <dhowells@redhat.com> wrote:
>
> From: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
>
> Need to call rxrpc_put_local() for peer candidate before kfree() as it
> holds a ref to rxrpc_local.
>
> [DH: v2: Changed to abstract the peer freeing code out into a function]
>
> Fixes: 9ebeddef58c4 ("rxrpc: rxrpc_peer needs to hold a ref on the rxrpc_local record")
> Signed-off-by: Eiichi Tsukata <eiichi.tsukata@nutanix.com>
> Signed-off-by: David Howells <dhowells@redhat.com>
> cc: Marc Dionne <marc.dionne@auristor.com>
> cc: linux-afs@lists.infradead.org
> Link: https://lore.kernel.org/all/20211121041608.133740-2-eiichi.tsukata@nutanix.com/ # v1
> ---
>
>  net/rxrpc/peer_object.c |   14 +++++++++-----
>  1 file changed, 9 insertions(+), 5 deletions(-)
>
> diff --git a/net/rxrpc/peer_object.c b/net/rxrpc/peer_object.c
> index 68396d052052..0298fe2ad6d3 100644
> --- a/net/rxrpc/peer_object.c
> +++ b/net/rxrpc/peer_object.c
> @@ -299,6 +299,12 @@ static struct rxrpc_peer *rxrpc_create_peer(struct rxrpc_sock *rx,
>         return peer;
>  }
>
> +static void rxrpc_free_peer(struct rxrpc_peer *peer)
> +{
> +       rxrpc_put_local(peer->local);
> +       kfree_rcu(peer, rcu);
> +}
> +
>  /*
>   * Set up a new incoming peer.  There shouldn't be any other matching peers
>   * since we've already done a search in the list from the non-reentrant context
> @@ -365,7 +371,7 @@ struct rxrpc_peer *rxrpc_lookup_peer(struct rxrpc_sock *rx,
>                 spin_unlock_bh(&rxnet->peer_hash_lock);
>
>                 if (peer)
> -                       kfree(candidate);
> +                       rxrpc_free_peer(candidate);
>                 else
>                         peer = candidate;
>         }
> @@ -420,8 +426,7 @@ static void __rxrpc_put_peer(struct rxrpc_peer *peer)
>         list_del_init(&peer->keepalive_link);
>         spin_unlock_bh(&rxnet->peer_hash_lock);
>
> -       rxrpc_put_local(peer->local);
> -       kfree_rcu(peer, rcu);
> +       rxrpc_free_peer(peer);
>  }
>
>  /*
> @@ -457,8 +462,7 @@ void rxrpc_put_peer_locked(struct rxrpc_peer *peer)
>         if (n == 0) {
>                 hash_del_rcu(&peer->hash_link);
>                 list_del_init(&peer->keepalive_link);
> -               rxrpc_put_local(peer->local);
> -               kfree_rcu(peer, rcu);
> +               rxrpc_free_peer(peer);
>         }
>  }

Reviewed-by: Marc Dionne <marc.dionne@auristor.com>

Marc

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
  2021-11-26  8:05 ` David Howells
  2021-11-26  8:34   ` Eiichi Tsukata
@ 2021-11-29 15:40   ` David Howells
  1 sibling, 0 replies; 9+ messages in thread
From: David Howells @ 2021-11-29 15:40 UTC (permalink / raw)
  To: Eiichi Tsukata
  Cc: dhowells, Jakub Kicinski, Marc Dionne, linux-afs, netdev, linux-kernel

Eiichi Tsukata <eiichi.tsukata@nutanix.com> wrote:

> Thanks, I’ve tested them with my environment. Looks good.

Thanks.

David


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
  2021-11-24 14:37 [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() David Howells
                   ` (3 preceding siblings ...)
  2021-11-26 13:12 ` Marc Dionne
@ 2021-11-29 15:53 ` David Howells
  4 siblings, 0 replies; 9+ messages in thread
From: David Howells @ 2021-11-29 15:53 UTC (permalink / raw)
  To: Jakub Kicinski
  Cc: dhowells, Eiichi Tsukata, Marc Dionne, linux-afs, netdev, linux-kernel

Hi Jakub,

> Are these supposed to go to net? They are addressed To: the author.

I've posted a new set to netdev that has the Acks from Marc added for you to
pick up.

David


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2021-11-29 15:56 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-11-24 14:37 [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() David Howells
2021-11-24 14:37 ` [PATCH 2/2] rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() David Howells
2021-11-26 13:15   ` Marc Dionne
2021-11-26  3:27 ` [PATCH 1/2] rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() Jakub Kicinski
2021-11-26  8:05 ` David Howells
2021-11-26  8:34   ` Eiichi Tsukata
2021-11-29 15:40   ` David Howells
2021-11-26 13:12 ` Marc Dionne
2021-11-29 15:53 ` David Howells

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).