Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3277360ybz; Sun, 19 Apr 2020 22:48:25 -0700 (PDT) X-Google-Smtp-Source: APiQypL9YNs83YPlx6R2q6vi1prEF7IrImpe97qyGlfw5IV7n/ZPCmi4XZhhkBLfMgS8LeVcHTHF X-Received: by 2002:a50:8d02:: with SMTP id s2mr13120257eds.81.1587361704754; Sun, 19 Apr 2020 22:48:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587361704; cv=none; d=google.com; s=arc-20160816; b=in9zJMlJHSGY4oVvNxxrsGL5mr3PmLmHF+zYF4E85USswJlLgLrsuk0itEgEIsjOb0 R2kIoTp9FWSPvIoWXxnKJCvP0DX4O+zGgRCdcJ5wChkeE5aOnKjWZoyzh89qXKyP/QiM b4p3nhbsu6nD7xMOqXnk4geuv/dA+x0JE9fyurwXauyXlZEg3V/JAPieBg4NBPsh29ev evsNB8oRCKrtpFqDxOVEWmYSoYOriaJNTGNzLnWEUTXndC6McmLaYNqIoKf6ncO5nZ6l GJjwmznj0VEVd9z2kAXLekwM2y4fI94F71hksw1ZOYDuDzRIjsndEMg7JRgsoz48F7QR 767Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=qrIWzL6L4fG1PLKjh4BfQqE2OBgxM/LVzA5nkNsVK8k=; b=zTa2Gl1J8XGNF9FwnNPrK7t62Z8+uur8umrV5BOjfzlucDkkbAY97mQUMsJIofTjYv iVmFSZAC07A6EoXNrWS1mf3JY//RYuvgxDMHdt3V45eV+kbFENF/PVhij/wXxp4QXiKa /T86SZKGpObytNLxdBF+3ynMWl6nnUWXGGUJ35NRgn82i1Lxyj2BgnadM6sxwru77SL0 697LswhaytmwVQH52tQ8b+ORwYnoVblljSyGy6EZVtcH5O48yP71/fnQX72L9auGfmTQ xifMXQP7bUfSh+jSVGLdGf6wKDhEaawfVTBxuQgQBhjVcXV2K/t99h+1HsSlJEPcAOkZ rgQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=W93GX35G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a8si6997134edr.518.2020.04.19.22.48.01; Sun, 19 Apr 2020 22:48:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=W93GX35G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726197AbgDTFqE (ORCPT + 99 others); Mon, 20 Apr 2020 01:46:04 -0400 Received: from mail.fudan.edu.cn ([202.120.224.10]:55920 "EHLO fudan.edu.cn" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725379AbgDTFqE (ORCPT ); Mon, 20 Apr 2020 01:46:04 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fudan.edu.cn; s=dkim; h=Received:From:To:Cc:Subject:Date: Message-Id; bh=qrIWzL6L4fG1PLKjh4BfQqE2OBgxM/LVzA5nkNsVK8k=; b=W 93GX35Gw3lT+tItHieWTmKDi6DEeS9tic9xj8O8QkXfKWvlfzz/qBP8PXMtCinUA VgCUgjx0DzVIUF6oGkmcleQJWFWmmsPYoTtf7SoPRZn/MwAvXhVs4VnV4KppbxeA 7twC460tdpafIPIWFdSDIy3yFhfUn7/duadfCdYDRk= Received: from localhost.localdomain (unknown [120.229.255.67]) by app1 (Coremail) with SMTP id XAUFCgBHOHUIN51ezIQWAA--.58148S3; Mon, 20 Apr 2020 13:45:45 +0800 (CST) From: Xiyu Yang To: "J. Bruce Fields" , Chuck Lever , Trond Myklebust , Anna Schumaker , "David S. Miller" , Jakub Kicinski , linux-nfs@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: yuanxzhang@fudan.edu.cn, kjlu@umn.edu, Xiyu Yang , Xin Tan Subject: [PATCH] SUNRPC: Fix refcnt leak in rpc_clnt_test_and_add_xprt Date: Mon, 20 Apr 2020 13:45:19 +0800 Message-Id: <1587361519-83687-1-git-send-email-xiyuyang19@fudan.edu.cn> X-Mailer: git-send-email 2.7.4 X-CM-TRANSID: XAUFCgBHOHUIN51ezIQWAA--.58148S3 X-Coremail-Antispam: 1UD129KBjvJXoW7uF4UuF1rJF43Cw13ZrW8Zwb_yoW8Ar1Dpr W8C3y3Cr98tr1xA3Zaya18W3WrArn3Xa13Grs0krn5Crn7ta4Iyw40grW29F48ZrWruF4U Zr4Yvrs8AF1Dua7anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUU9K14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26rxl 6s0DM28EF7xvwVC2z280aVAFwI0_GcCE3s1l84ACjcxK6I8E87Iv6xkF7I0E14v26rxl6s 0DM2vYz4IE04k24VAvwVAKI4IrM2AIxVAIcxkEcVAq07x20xvEncxIr21l5I8CrVACY4xI 64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r126r1DMcIj6I8E87Iv67AKxVWUJVW8Jw Am72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41lF7I21c0EjII2zVCS5cI20VAG YxC7M4IIrI8v6xkF7I0E8cxan2IY04v7MxkIecxEwVAFwVW8WwCF04k20xvY0x0EwIxGrw CFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE 14v26r106r1rMI8E67AF67kF1VAFwI0_Jw0_GFylIxkGc2Ij64vIr41lIxAIcVC0I7IYx2 IY67AKxVWUCVW8JwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Cr0_Gr1UMIIF0xvE42xK8VAv wI8IcIk0rVW8JVW3JwCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14 v26r4j6r4UJbIYCTnIWIevJa73UjIFyTuYvjfUYR6wDUUUU X-CM-SenderInfo: irzsiiysuqikmy6i3vldqovvfxof0/ Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org rpc_clnt_test_and_add_xprt() invokes xprt_switch_get() and xprt_get(), which returns a reference of the rpc_xprt_switch object to "data->xps" and a reference of the rpc_xprt object to "data->xprt" with increased refcount. When rpc_clnt_test_and_add_xprt() returns, local variable "data" and its field "xps" as well as "xprt" becomes invalid, so their refcounts should be decreased to keep refcount balanced. The reference counting issue happens in one exception handling paths of rpc_clnt_test_and_add_xprt(). When rpc_call_null_helper() returns IS_ERR, the refcnt increased by xprt_switch_get() and xprt_get() are not decreased, causing a refcnt leak. Fix this issue by calling rpc_cb_add_xprt_release() to decrease related refcounted fields in "data" and then release it when rpc_call_null_helper() returns IS_ERR. Fixes: 7f554890587c ("SUNRPC: Allow addition of new transports to a struct rpc_clnt") Signed-off-by: Xiyu Yang Signed-off-by: Xin Tan --- net/sunrpc/clnt.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c index 7324b21f923e..f86d9ae2167f 100644 --- a/net/sunrpc/clnt.c +++ b/net/sunrpc/clnt.c @@ -2803,8 +2803,10 @@ int rpc_clnt_test_and_add_xprt(struct rpc_clnt *clnt, task = rpc_call_null_helper(clnt, xprt, NULL, RPC_TASK_SOFT|RPC_TASK_SOFTCONN|RPC_TASK_ASYNC|RPC_TASK_NULLCREDS, &rpc_cb_add_xprt_call_ops, data); - if (IS_ERR(task)) + if (IS_ERR(task)) { + rpc_cb_add_xprt_release(data); return PTR_ERR(task); + } rpc_put_task(task); success: return 1; -- 2.7.4