Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2835431pxv; Mon, 12 Jul 2021 03:07:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwknuolRnkXYs0l4nd6pXxrTAiyh+JyXjmcQMWGzZx2eo9sPC25Ryv6Xh8fSpXQNZiz2LLX X-Received: by 2002:a05:6e02:2144:: with SMTP id d4mr38423996ilv.136.1626084458368; Mon, 12 Jul 2021 03:07:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626084458; cv=none; d=google.com; s=arc-20160816; b=1C8OIz3nA/EAq9udVaVvncPlO33aqhFbk2NFxFCVDUjNIiNFotWsV0mQn2f0N8BjDB ErVGsHabAm3GkRq/YQHH69ocwfwRkdFPRrTqTsSXicV6Lbxhjl3qF3YhcPoCZScQZjfO DI/rnzf6coVxY86OMNmQIgkh1tSE/Nq9gcPL10caFNGQHGyo33RyhgutPUr+ytzCxR/K pwy3LwXodUE6a6WHRejXs2VquD4fUTFFj+W+XSFlYAA1qjRisULRlDgmyoGP2L1wrrHB aAe5hj28dD34BXTCAD4cEbEbLA58nOwBorEd12Faa+VFzS0hXBYoxDkZkBdUVmveFMiu zbXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1gTCzZEQ8F1QcLTb421vQDQw5Am2kVMjumLGGaiL/0I=; b=zd7sGRFzike/gt/o5ugdmvmrVc+YNLuA92YcSCbaT1Kd2RW2M5JK/+a1h5IaliaQrJ /XeTNIhJEq0qPBJuYYtq7NrcudHplPSvts6zQRGIl2ZJ73GQX3jO6ZGMHu7dh79vNMw3 ewUiKnXLZ0CMhh8I+6wF1C5fjgZrIE29cdcHXZ6qVZtF6cyPRKi/eCGM4UM6rV+egUk0 YW3et8Zr91U7phFjVxsAlEpuhHtxycivMPpRkD3BcrlIVtWU2RkEkgCmxtxsKxt9ih9Y Zkf/Q7I9UOQGhBzVHTwsCLpq/aaiEcUUrGHkAXJ6EJDWJNKd2nivTZtM56gLvHWjusDa rImQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=q8Rp4l9g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u12si9673508iot.101.2021.07.12.03.07.27; Mon, 12 Jul 2021 03:07:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=q8Rp4l9g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346712AbhGLHsV (ORCPT + 99 others); Mon, 12 Jul 2021 03:48:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:48306 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240351AbhGLHOJ (ORCPT ); Mon, 12 Jul 2021 03:14:09 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 56ED361206; Mon, 12 Jul 2021 07:11:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626073866; bh=MKCKZ5s1LJJY5u7B2RWgKfUwYZugg517Q0Vn0DZY+j4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=q8Rp4l9g+OSNpJ4z0MfdweAjBx4DytYrDMl/g81KuCazIczCUG7n+BwR2HmqFLsDJ zzyUQVSRXwU2RpRHTv7UOtOGSITYoRH8jyPgMF5auIjRqSBo4w/Rj1p/d/i9rF3qko u+AurV35e+VV0aabPq21ygwBsaTHpKJQgWKUY8yI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gioh Kim , Md Haris Iqbal , Jack Wang , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.12 385/700] RDMA/rtrs-srv: Fix memory leak of unfreed rtrs_srv_stats object Date: Mon, 12 Jul 2021 08:07:48 +0200 Message-Id: <20210712061017.332475096@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060924.797321836@linuxfoundation.org> References: <20210712060924.797321836@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gioh Kim [ Upstream commit 2371c40354509746e4a4dad09a752e027a30f148 ] When closing a session, currently the rtrs_srv_stats object in the closing session is freed by kobject release. But if it failed to create a session by various reasons, it must free the rtrs_srv_stats object directly because kobject is not created yet. This problem is found by kmemleak as below: 1. One client machine maps /dev/nullb0 with session name 'bla': root@test1:~# echo "sessname=bla path=ip:192.168.122.190 \ device_path=/dev/nullb0" > /sys/devices/virtual/rnbd-client/ctl/map_device 2. Another machine failed to create a session with the same name 'bla': root@test2:~# echo "sessname=bla path=ip:192.168.122.190 \ device_path=/dev/nullb1" > /sys/devices/virtual/rnbd-client/ctl/map_device -bash: echo: write error: Connection reset by peer 3. The kmemleak on server machine reported an error: unreferenced object 0xffff888033cdc800 (size 128): comm "kworker/2:1", pid 83, jiffies 4295086585 (age 2508.680s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000a72903b2>] __alloc_sess+0x1d4/0x1250 [rtrs_server] [<00000000d1e5321e>] rtrs_srv_rdma_cm_handler+0xc31/0xde0 [rtrs_server] [<00000000bb2f6e7e>] cma_ib_req_handler+0xdc5/0x2b50 [rdma_cm] [<00000000e896235d>] cm_process_work+0x2d/0x100 [ib_cm] [<00000000b6866c5f>] cm_req_handler+0x11bc/0x1c40 [ib_cm] [<000000005f5dd9aa>] cm_work_handler+0xe65/0x3cf2 [ib_cm] [<00000000610151e7>] process_one_work+0x4bc/0x980 [<00000000541e0f77>] worker_thread+0x78/0x5c0 [<00000000423898ca>] kthread+0x191/0x1e0 [<000000005a24b239>] ret_from_fork+0x3a/0x50 Fixes: 39c2d639ca183 ("RDMA/rtrs-srv: Set .release function for rtrs srv device during device init") Link: https://lore.kernel.org/r/20210528113018.52290-18-jinpu.wang@ionos.com Signed-off-by: Gioh Kim Signed-off-by: Md Haris Iqbal Signed-off-by: Jack Wang Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/ulp/rtrs/rtrs-srv.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/infiniband/ulp/rtrs/rtrs-srv.c b/drivers/infiniband/ulp/rtrs/rtrs-srv.c index d071809e3ed2..8c0acfc48392 100644 --- a/drivers/infiniband/ulp/rtrs/rtrs-srv.c +++ b/drivers/infiniband/ulp/rtrs/rtrs-srv.c @@ -1477,6 +1477,7 @@ static void free_sess(struct rtrs_srv_sess *sess) kobject_del(&sess->kobj); kobject_put(&sess->kobj); } else { + kfree(sess->stats); kfree(sess); } } -- 2.30.2