Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp6437749imm; Mon, 27 Aug 2018 16:11:35 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZfrf53irci9rUrFniDGswdeD0eeZECKx99PSRtw9I7zZCr24mrU0s+02E6MWcey5EReXKG X-Received: by 2002:a62:9bc9:: with SMTP id e70-v6mr15950552pfk.95.1535411495886; Mon, 27 Aug 2018 16:11:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535411495; cv=none; d=google.com; s=arc-20160816; b=c5WIGhW/5oXkSGmI17Y4zDvPLdw65PuSZr8KAYNIs7eeLI48uD13FEPNp1chtAiG7D ZUo9bDp7O/zjh1S9AQtSyZIhkkDAwglNLwaVHelzvJCdBtaH0lpEEUu37uPsr5RqVV+r BOy4k//72o38j8TXf/agbt98+Vg3zKDj10+DhUhroHmKxmQAuZ966tswXFEZhZMFbSGj SC0SL+5Q/DPAKMT18+0fCBaaaQb/2houp3n3+w5Fv9gdO8dFE1VPFp7r9B4yWlSCZU/q IAmwh7FtARsR+puDF79GlXJDtXBL345ClxZSUVqR/rOhKgLKxigVNwGieH70jhEeB64z IxmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=w0jRaCozZyzw0p9+HhvpV3Bei1OjCEBrGSxbBEn5MNo=; b=SxAUNOQsQQdNIFnl04i5CFnmrtvALT8dhmRysaSXXcuZKZNhYqgS2AdmViHeso+Rxn gks1EMqxj98SxgZ/O1+D9TkaM71DONbkP7pWB7iQ4u5aptZuxB9dSSNZClCMWY3w1hL2 VLZ9BUBEzQiTNleeVzpbHlg65k1lx6YnSQeZ3Vb+Q6hTNVgvFziEjLttX0MTAO2Mv5cU iVQ8vHVn+o7E/UpV2pccKFnzF6LPHis/asnZmz2AREOw1vW3f2Df1TLfR62jjSjNre2t OHKnclHgrVODsJPxmgSmweWRMeGxMIwJEXMrzaZWCe4RndvbPUAN7LI4H2gWgOexsU+S OWHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cf13-v6si468952plb.334.2018.08.27.16.11.19; Mon, 27 Aug 2018 16:11:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727370AbeH1C64 (ORCPT + 99 others); Mon, 27 Aug 2018 22:58:56 -0400 Received: from nautica.notk.org ([91.121.71.147]:47193 "EHLO nautica.notk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727101AbeH1C64 (ORCPT ); Mon, 27 Aug 2018 22:58:56 -0400 Received: by nautica.notk.org (Postfix, from userid 1001) id D2A41C009; Tue, 28 Aug 2018 01:10:09 +0200 (CEST) Date: Tue, 28 Aug 2018 01:09:54 +0200 From: Dominique Martinet To: Tomas Bortoli Cc: ericvh@gmail.com, rminnich@sandia.gov, lucho@ionkov.net, davem@davemloft.net, v9fs-developer@lists.sourceforge.net, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller@googlegroups.com, Dominique Martinet Subject: Re: [PATCH v2 2/2] 9p: Add refcount to p9_req_t Message-ID: <20180827230954.GA21513@nautica> References: <20180814174342.11068-1-tomasbortoli@gmail.com> <20180814174342.11068-2-tomasbortoli@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180814174342.11068-2-tomasbortoli@gmail.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Tomas Bortoli wrote on Tue, Aug 14, 2018: > To avoid use-after-free(s), use a refcount to keep track of the > usable references to any instantiated struct p9_req_t. > > This commit adds p9_req_put(), p9_req_get() and p9_req_try_get() as > wrappers to kref_put(), kref_get() and kref_get_unless_zero(). > These are used by the client and the transports to keep track of > valid requests' references. > > p9_free_req() is added back and used as callback by kref_put(). > > Add SLAB_TYPESAFE_BY_RCU as it ensures that the memory freed by > kmem_cache_free() will not be reused for another type until the rcu > synchronisation period is over, so an address gotten under rcu read > lock is safe to inc_ref() without corrupting random memory while > the lock is held. FWIW, since 4.19-rc1 has been tagged I was going to push this and all the perrequesites to linux-next, but I've managed to leak some requests by interrupting them in trans_virtio. I think I've found why (see below), so I'll push a fixed version after some more testing and another thorough read -- at some point today, but this hasn't been 'approved' explicitely so please review! :) (Jun, I think you'll need to ask again to rename 'req' to 'rreq' if you think it's important -- I think such a rename should go in a separate patch anyway, there's plenty of time until the 4.20 merge window) By "all the prerequesites" I mean this patch "serie": * 9p: Use a slab for allocating requests * 9p: Remove p9_idpool * net/9p: embed fcall in req to round down buffer allocs * net/9p: add a per-client fcall kmem_cache * 9p: rename p9_free_req() function * 9p: Add refcount to p9_req_t All the other patchs have had some review though, I was just waiting for the start of this cycle, but if someone has any issue with the above patches now is a good time to say. > diff --git a/net/9p/client.c b/net/9p/client.c > index 7942c0bfcc5b..c9bb5d41afa4 100644 > --- a/net/9p/client.c > +++ b/net/9p/client.c > @@ -716,6 +756,8 @@ p9_client_rpc(struct p9_client *c, int8_t type, const char *fmt, ...) > > err = c->trans_mod->request(c, req); > if (err < 0) { > + /* write won't happen */ > + p9_req_put(req); > if (err != -ERESTARTSYS && err != -EFAULT) > c->status = Disconnected; > goto recalc_sigpending; p9_client_zc_rpc needs the same put if zc_request failed, I'm not sure why it wasn't here in my draft -- Dominique