Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp7820117rwd; Tue, 20 Jun 2023 06:43:40 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5RtQcv3DKR+G6UIs2Flp3YkdP3029xpaOdUGkrlGh1vlXjitkWkgoBl8umXMjl7SaCKpFe X-Received: by 2002:a05:6a20:9146:b0:104:1f67:1157 with SMTP id x6-20020a056a20914600b001041f671157mr16857820pzc.26.1687268620178; Tue, 20 Jun 2023 06:43:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687268620; cv=none; d=google.com; s=arc-20160816; b=jotXN2X87zGm0z5L0P5sjXBHpF2wK/my3spRpNBkw3wAEjtjbU9Ntltw5+p+ooMJfA gKlAB901OXV5OIWS4Go6sxnhApKUSCo7Qy/klvfQybpkbMTDAPdpq/XdW7KhyEuOE0wr L/+x6sjoDQ2Lqj5nMg01oNQDVCHdEv+vkSByy1abl4wgRvWV5ltDs0g4E1gLqL8xz24u dNbpUIHrDYEuE0KyRyeEeWA9tuSdfU7jdA9lZ8aY2YuuDdIYsp92AZrg3gEZUkQ/pP68 UonMawdzJf8tB5mHDfVFCpGY6sS/aiWDTd2x5WwraIJ99jBqlpMxKu2sAbamga3qIAuA C7Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=W2dcMlco4IaX1eYG+QaSwRA5SCo5zMhvqpPQKpXYteE=; b=RPvqsYXzlSt1kMzSCeHamzg2oyf4AeqSmCVh7C6YAsVfbUAbeYgkFC9TlGZp53QLTc sG5Vr+AQ9vn9cNyb4LriH5XzHzaJqkNu2BigfWH4mgCo/IwzB2aympD9d8EMvRvrCISy oWiBNu2KwToEicf0PmnRKd2kWcuwdno5SoFsNhzXV6qBA2uGy/1/P5sLZQ+fUlJq9E1Q FX8O3NrcpyXlbT8IWErHryl1N3yuOMzJ1x2SLF21Qwliq4CIkQOiJnbG/bQjM9nTyEGQ Cqvb12xNB2m428vbKnsO4z2ux8OxhteUwaCCrvvaKOY+oQtA/l+6Gbr3k36wPlosXfV/ e2vg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=G3zNI7xI; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=QPyaU8DD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s189-20020a625ec6000000b00666aaa3b271si1719850pfb.10.2023.06.20.06.43.26; Tue, 20 Jun 2023 06:43:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=G3zNI7xI; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519 header.b=QPyaU8DD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233066AbjFTNhk (ORCPT + 99 others); Tue, 20 Jun 2023 09:37:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233014AbjFTNhY (ORCPT ); Tue, 20 Jun 2023 09:37:24 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3F9A81BB; Tue, 20 Jun 2023 06:37:23 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id E005C1F88F; Tue, 20 Jun 2023 13:37:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1687268241; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=W2dcMlco4IaX1eYG+QaSwRA5SCo5zMhvqpPQKpXYteE=; b=G3zNI7xIRS4BGhdLruB4zto97XoVHG4t1yJ94Ic72x1llG3iXjlJNYS1Cl4P64FTeOnkP1 ba5PtHYsZL+o2My5IJ0xUsCq06E81go5qx4vB+HiRl3KDWxi/aCBIejWBHTgMX8l/y/z/N kj1SzfeYkb5jqFLobujjdCNlQbr5DIs= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1687268241; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=W2dcMlco4IaX1eYG+QaSwRA5SCo5zMhvqpPQKpXYteE=; b=QPyaU8DDuLSEf3IezpMohcmGhrB/Vqfa3ck8yQeA3TXeuhIkkmZazyA9Gu3LGLPS6nhgEj PQq9qfg1vqVl2dDg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id D1FC8133A9; Tue, 20 Jun 2023 13:37:21 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id GA0+M5GrkWTKPQAAMHmgww (envelope-from ); Tue, 20 Jun 2023 13:37:21 +0000 From: Daniel Wagner To: linux-nvme@lists.infradead.org Cc: linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, Chaitanya Kulkarni , Shin'ichiro Kawasaki , Sagi Grimberg , Hannes Reinecke , James Smart , Daniel Wagner Subject: [PATCH v2 5/5] nvme-fc: do no free ctrl opts Date: Tue, 20 Jun 2023 15:37:11 +0200 Message-ID: <20230620133711.22840-6-dwagner@suse.de> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20230620133711.22840-1-dwagner@suse.de> References: <20230620133711.22840-1-dwagner@suse.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since the initial additional of the FC transport e399441de911 ("nvme-fabrics: Add host support for FC transport"), the transport also freed the options. Since nvme_free_ctrl() is freeing the options too commit de41447aac03 ("nvme-fc: avoid memory corruption caused by calling nvmf_free_options() twice") was added to avoid double frees. With the change to make the initial connection attempt synchronous again, the life time of all object is known also in the error case. All resources will be freed in the same context. The FC transport should not free the options as the generic auth code is relying to be able to read the options even in the shutdown path (see nvme_auth_free is calling ctrl_max_dhchaps which relies on opts being a valid pointer). TCP and RDMA also avoid freeing the options, so make the FC transport behave the same. Signed-off-by: Daniel Wagner --- drivers/nvme/host/fc.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/drivers/nvme/host/fc.c b/drivers/nvme/host/fc.c index aa2911f07c6c..6f5cfa47fee5 100644 --- a/drivers/nvme/host/fc.c +++ b/drivers/nvme/host/fc.c @@ -2413,8 +2413,6 @@ nvme_fc_ctrl_free(struct kref *ref) nvme_fc_rport_put(ctrl->rport); ida_free(&nvme_fc_ctrl_cnt, ctrl->cnum); - if (ctrl->ctrl.opts) - nvmf_free_options(ctrl->ctrl.opts); kfree(ctrl); } @@ -3568,8 +3566,6 @@ nvme_fc_init_ctrl(struct device *dev, struct nvmf_ctrl_options *opts, cancel_work_sync(&ctrl->ctrl.reset_work); cancel_delayed_work_sync(&ctrl->connect_work); - ctrl->ctrl.opts = NULL; - /* initiate nvme ctrl ref counting teardown */ nvme_uninit_ctrl(&ctrl->ctrl); -- 2.41.0