Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp642699ybz; Wed, 22 Apr 2020 05:21:13 -0700 (PDT) X-Google-Smtp-Source: APiQypJsu9K5negmbt39/7mjSfQotHpfDWetKyYU4AQydqcUHG8TJQmm0/TOWGCJyaDtjY2A/VNy X-Received: by 2002:a17:906:5e45:: with SMTP id b5mr25102123eju.0.1587558073041; Wed, 22 Apr 2020 05:21:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587558073; cv=none; d=google.com; s=arc-20160816; b=Kj3JM/GXuHXiKH/xbbnaW+RMSpVPZ0diZMEbBQ/LHBjZAUAm4Mw6/VEmCcBfvZda+f 8bfjRiCuUrSNn5HKP7ERKsBBLct/aDIL624mjacFawD+soSRszYGVYI11wReig7Bk18u znhPCtA+Vei/QYSVmP20rDky3UdZyUQ6BiLs8N1bBLmO0I0yX948PZ7cZpbf7UoIVOZV ySBTiazkyt71GkkptwJM5NEIFwcAszDNsszIEOPR8/gJ4XddFpvSnwG3d6/effYsofNx +m27ax/5M/l8najMtbqWTEMYVcchf/o85XX5ZHqpsY+8jw3oYAW7vNL8k3xr7smspTcs YXjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Svg53MUSBav4Xl8cMcTqkb4nW+BhI+tO0TELiTLDhrw=; b=MC0GXplWiGitorDAq74YsXXL9mxfSHTc6iut5/v07FuFJoh/nLDNV7HtWkBIdJYINd SoW5PMwuq6pcFRXNPT98um8Q/hdbCA+3FAFPQ/1n+t1Tkm3xWj7me+CavFA5GJHQl7hh GHKesHWHJxVAWyhSI/DtRnFN3H1KjJtxIz1eirFqr4nS05bCtaaJFVf3/bPiLVFbRw7N CcEZ4nIPwhtuDWjpgUkBthOnMBrGYg5MAQpJ6umcopuiMl6b1hSbjIc8M/66ZKHyoSqh uQ/OIuZoDu/l2E3PwXm4Jjg+/dyI+wQROEHoern8R+Rf/MdfwAYKqI28xjAmpNW9gaKA QodQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vE7XA2P4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p13si3593281ejo.283.2020.04.22.05.20.49; Wed, 22 Apr 2020 05:21:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vE7XA2P4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729754AbgDVKQZ (ORCPT + 99 others); Wed, 22 Apr 2020 06:16:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:51386 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729700AbgDVKPt (ORCPT ); Wed, 22 Apr 2020 06:15:49 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7EDEE2075A; Wed, 22 Apr 2020 10:15:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587550549; bh=+xK4L6oD4p1u6YvwdsuYxfmVsJ6rndAC+6FCgwEKWhQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vE7XA2P4u+9HLgpTBn44Kua1zGuV6+5k5mnIdV0RNqajRn+hNt2jhq7X4Z2tPAdba AxsDyYOXwVYPpFtBQAS6rALkon60R7mdGrAq6wmHrnRxNLJtdorR79Vqcdu09i7NWl YbN4E0oMOyFUiUE/XPI6BDOQbN8sKr2sv61eHGgE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ilya Dryomov , Jason Dillaman , Sasha Levin Subject: [PATCH 4.19 19/64] rbd: call rbd_dev_unprobe() after unwatching and flushing notifies Date: Wed, 22 Apr 2020 11:57:03 +0200 Message-Id: <20200422095016.476360621@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200422095008.799686511@linuxfoundation.org> References: <20200422095008.799686511@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ilya Dryomov [ Upstream commit 952c48b0ed18919bff7528501e9a3fff8a24f8cd ] rbd_dev_unprobe() is supposed to undo most of rbd_dev_image_probe(), including rbd_dev_header_info(), which means that rbd_dev_header_info() isn't supposed to be called after rbd_dev_unprobe(). However, rbd_dev_image_release() calls rbd_dev_unprobe() before rbd_unregister_watch(). This is racy because a header update notify can sneak in: "rbd unmap" thread ceph-watch-notify worker rbd_dev_image_release() rbd_dev_unprobe() free and zero out header rbd_watch_cb() rbd_dev_refresh() rbd_dev_header_info() read in header The same goes for "rbd map" because rbd_dev_image_probe() calls rbd_dev_unprobe() on errors. In both cases this results in a memory leak. Fixes: fd22aef8b47c ("rbd: move rbd_unregister_watch() call into rbd_dev_image_release()") Signed-off-by: Ilya Dryomov Reviewed-by: Jason Dillaman Signed-off-by: Sasha Levin --- drivers/block/rbd.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/block/rbd.c b/drivers/block/rbd.c index 8e2df524494cb..1101290971699 100644 --- a/drivers/block/rbd.c +++ b/drivers/block/rbd.c @@ -5723,9 +5723,10 @@ static int rbd_dev_header_name(struct rbd_device *rbd_dev) static void rbd_dev_image_release(struct rbd_device *rbd_dev) { - rbd_dev_unprobe(rbd_dev); if (rbd_dev->opts) rbd_unregister_watch(rbd_dev); + + rbd_dev_unprobe(rbd_dev); rbd_dev->image_format = 0; kfree(rbd_dev->spec->image_id); rbd_dev->spec->image_id = NULL; @@ -5776,7 +5777,7 @@ static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth) ret = rbd_dev_header_info(rbd_dev); if (ret) - goto err_out_watch; + goto err_out_probe; /* * If this image is the one being mapped, we have pool name and @@ -5822,12 +5823,11 @@ static int rbd_dev_image_probe(struct rbd_device *rbd_dev, int depth) return 0; err_out_probe: - rbd_dev_unprobe(rbd_dev); -err_out_watch: if (!depth) up_write(&rbd_dev->header_rwsem); if (!depth) rbd_unregister_watch(rbd_dev); + rbd_dev_unprobe(rbd_dev); err_out_format: rbd_dev->image_format = 0; kfree(rbd_dev->spec->image_id); -- 2.20.1