Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp2978360rdb; Mon, 4 Dec 2023 12:57:04 -0800 (PST) X-Google-Smtp-Source: AGHT+IGRyB3hWpMV/+ZmrXjXkr6ZGlYXHwqFXGw1H8EOR5iVyN0WACYUMPORyNfm4mlHOJ2MI3wM X-Received: by 2002:a17:90b:1e4c:b0:286:9b50:b98 with SMTP id pi12-20020a17090b1e4c00b002869b500b98mr97802pjb.5.1701723424356; Mon, 04 Dec 2023 12:57:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701723424; cv=none; d=google.com; s=arc-20160816; b=IHCgx9ZttbbxU0EewyPtzUTs5agSbHpI8DHynwoAq5uZBvCeVdodwJDcBRIloNRuAd mfC1+XFArq2RJl6vSSw9pPAKevN7BYISD7Fqti5uO7QXlYI7AY1OIALRqA+bqNkjBjQs cIXuWJHfaeMKDU6YWaafGuGRHUOhjVFx9bVN+9oX8LXNPqUukQgLc84sJXLpgGYMwc/O 5/k3gfk13qwzMz03FS3xkafTtS0pOAdNkENjPSNdgo1+g12ZhPupJksPQEw+a1cWtBGZ CV5s4PhWZcUIeHFLmBCHbJm2MiFV/ClaYNess9H7tNAXjD3epoRJ/nTbepALdFISou9B BjqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=qN1XS3PUQh/SNdnH3l3+prVnbHkxP15eE1jftD1eXYs=; fh=OhdLX5uW5PZYedAPO1wg0or5efyv03vBd3/THpWaqfU=; b=K/1idTEKg2xJhR4KE6Y0tQ4rjC5mjfNBbL/Uh2gAFHn/j+vLSafYLyUUvrwrQ/1Kny wIftQxYR9lfA7q5yitD4DsNU3jtPxe5SfWo60+4J9XUea1REPAJrkPdktX1rphedcuDO RM4LsgN/CaW75osS/sOqbJXy5OGJfPbynKE9kvDc1SspTuRzClS2kYCWmKq9AtHY3iXt mhY9lAr8TIK/ovt03zIfIFxLNPstQudlL8XKNGgc3ec8icPFjy3wTPW4IZSnvO/hrlKm Wp9ZYMvHpOu6TAQGrkUdEiSDPIahXSiLycEggvx3HAMu/KzeTGOi1KSRgGLP7KvVS6Xj FNLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=gMQdTPEL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id n8-20020a170903110800b001cfc156a788si8507048plh.527.2023.12.04.12.57.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Dec 2023 12:57:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=gMQdTPEL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id DF42780AA264; Mon, 4 Dec 2023 12:56:58 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230355AbjLDU4n (ORCPT + 99 others); Mon, 4 Dec 2023 15:56:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34094 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233865AbjLDUNV (ORCPT ); Mon, 4 Dec 2023 15:13:21 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1C8F6F0 for ; Mon, 4 Dec 2023 12:13:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701720807; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=qN1XS3PUQh/SNdnH3l3+prVnbHkxP15eE1jftD1eXYs=; b=gMQdTPELRHCp8KBHdKHPtae0uEMXvDesTJskt0BO/sFvrJcZpxxr2hIVl6vFLu84tdt8QG s5tlR9lB3w0YJBEan07dn8YaGVOU/ojfcgmjKN8ZO5BKh8z60utDD0hCsJT4C+Yym18ZVH +RCP2uVkk1MENW7ysEXnzvqmAcON57s= Received: from mail-ej1-f72.google.com (mail-ej1-f72.google.com [209.85.218.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-117-0k4R4J1OMve4BtuwY7CMSA-1; Mon, 04 Dec 2023 15:13:26 -0500 X-MC-Unique: 0k4R4J1OMve4BtuwY7CMSA-1 Received: by mail-ej1-f72.google.com with SMTP id a640c23a62f3a-a1b466b0d24so100015266b.2 for ; Mon, 04 Dec 2023 12:13:25 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701720804; x=1702325604; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=qN1XS3PUQh/SNdnH3l3+prVnbHkxP15eE1jftD1eXYs=; b=AzFK3AFi6bS5ZA1yLIciKTv7n5aqddNGvRUKYa8mwZWHQYtvLzMIxFUvWcrNmA7b0A fBzIWSYmayMPw5BfXpkrqRqNw/3KGdGLdMbSRdB/Gv3EEivzfx7QoPnli243DFyEYOC8 dC6QLa0GlwvVtQbquRjtA1cCSFEGWggOgoTOoc13q4E0GSmpMtfpp5hkgRRS3vy+xJaz ZYwqHtjJ5l5WFD94Weqb2q7y7Vgvtgw+5rw2RXH1Su5NRlmELlrjRhgV1SIFqlODj+QF 08Naif9TfsCPnVV63ZoLdGbZ/IiFcvm8LVeD4A6Yf3gzzEnKvMZwM68UMX0qh7OkGqVA Uy4A== X-Gm-Message-State: AOJu0Yy9lOMNZt/C0AxSuj8az+EdMaDlqGRDF+RI6JPQpWN6plZhEWyB hBkL+Vlrrk1JYwCQfupWqU9KE9TxQ5qq+p7BKdv+Z37tjv5ZHTytK4lNpGHk5dof/ZkQhEUGmxp TSnDdJLUGd4p6CBYweEu4K/38uqUNpgD3 X-Received: by 2002:a17:906:f208:b0:a19:a1ba:bac1 with SMTP id gt8-20020a170906f20800b00a19a1babac1mr1760283ejb.103.1701720804520; Mon, 04 Dec 2023 12:13:24 -0800 (PST) X-Received: by 2002:a17:906:f208:b0:a19:a1ba:bac1 with SMTP id gt8-20020a170906f20800b00a19a1babac1mr1760277ejb.103.1701720804225; Mon, 04 Dec 2023 12:13:24 -0800 (PST) Received: from ?IPV6:2001:1c00:c32:7800:5bfa:a036:83f0:f9ec? (2001-1c00-0c32-7800-5bfa-a036-83f0-f9ec.cable.dynamic.v6.ziggo.nl. [2001:1c00:c32:7800:5bfa:a036:83f0:f9ec]) by smtp.gmail.com with ESMTPSA id lj8-20020a170906f9c800b009fe1dd221a3sm5614430ejb.92.2023.12.04.12.13.23 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 04 Dec 2023 12:13:23 -0800 (PST) Message-ID: Date: Mon, 4 Dec 2023 21:13:22 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH V6 01/20] platform/x86/intel/vsec: Fix xa_alloc memory leak Content-Language: en-US, nl To: david.e.box@linux.intel.com, =?UTF-8?Q?Ilpo_J=C3=A4rvinen?= Cc: LKML , platform-driver-x86@vger.kernel.org, rajvi.jingar@linux.intel.com References: <20231129222132.2331261-1-david.e.box@linux.intel.com> <20231129222132.2331261-2-david.e.box@linux.intel.com> <5c21230-1176-4168-f31f-a0c1f1713ca8@linux.intel.com> <198aadd7a91152393ec56d421fa042d30378af40.camel@linux.intel.com> From: Hans de Goede In-Reply-To: <198aadd7a91152393ec56d421fa042d30378af40.camel@linux.intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 04 Dec 2023 12:56:59 -0800 (PST) Hi, On 12/4/23 20:57, David E. Box wrote: > Hi Hans, > > On Mon, 2023-12-04 at 14:51 +0100, Hans de Goede wrote: >> Hi, >> >> On 11/30/23 12:02, Ilpo Järvinen wrote: >>> On Wed, 29 Nov 2023, David E. Box wrote: >>> >>>> Commit 936874b77dd0 ("platform/x86/intel/vsec: Add PCI error recovery >>>> support to Intel PMT") added an xarray to track the list of vsec devices >>>> to >>>> be recovered after a PCI error. But it did not provide cleanup for the >>>> list >>>> leading to a memory leak that was caught by kmemleak.  Do xa_alloc() >>>> before >>>> devm_add_action_or_reset() so that the list may be cleaned up with >>>> xa_erase() in the release function. >>>> >>>> Fixes: 936874b77dd0 ("platform/x86/intel/vsec: Add PCI error recovery >>>> support to Intel PMT") >>>> Signed-off-by: David E. Box >>>> --- >>>> >>>> V6 - Move xa_alloc() before ida_alloc() to reduce mutex use during error >>>>      recovery. >>>>    - Fix return value after id_alloc() fail >>>>    - Add Fixes tag >>>>    - Add more detail to changelog >>>> >>>> V5 - New patch >>>> >>>>  drivers/platform/x86/intel/vsec.c | 24 ++++++++++++++---------- >>>>  drivers/platform/x86/intel/vsec.h |  1 + >>>>  2 files changed, 15 insertions(+), 10 deletions(-) >>>> >>>> diff --git a/drivers/platform/x86/intel/vsec.c >>>> b/drivers/platform/x86/intel/vsec.c >>>> index c1f9e4471b28..2d568466b4e2 100644 >>>> --- a/drivers/platform/x86/intel/vsec.c >>>> +++ b/drivers/platform/x86/intel/vsec.c >>>> @@ -120,6 +120,8 @@ static void intel_vsec_dev_release(struct device *dev) >>>>  { >>>>         struct intel_vsec_device *intel_vsec_dev = dev_to_ivdev(dev); >>>>   >>>> +       xa_erase(&auxdev_array, intel_vsec_dev->id); >>>> + >>>>         mutex_lock(&vsec_ida_lock); >>>>         ida_free(intel_vsec_dev->ida, intel_vsec_dev->auxdev.id); >>>>         mutex_unlock(&vsec_ida_lock); >>>> @@ -135,19 +137,27 @@ int intel_vsec_add_aux(struct pci_dev *pdev, struct >>>> device *parent, >>>>         struct auxiliary_device *auxdev = &intel_vsec_dev->auxdev; >>>>         int ret, id; >>>>   >>>> -       mutex_lock(&vsec_ida_lock); >>>> -       ret = ida_alloc(intel_vsec_dev->ida, GFP_KERNEL); >>>> -       mutex_unlock(&vsec_ida_lock); >>>> +       ret = xa_alloc(&auxdev_array, &intel_vsec_dev->id, intel_vsec_dev, >>>> +                      PMT_XA_LIMIT, GFP_KERNEL); >>>>         if (ret < 0) { >>>>                 kfree(intel_vsec_dev->resource); >>>>                 kfree(intel_vsec_dev); >>>>                 return ret; >>>>         } >>>>   >>>> +       mutex_lock(&vsec_ida_lock); >>>> +       id = ida_alloc(intel_vsec_dev->ida, GFP_KERNEL); >>>> +       mutex_unlock(&vsec_ida_lock); >>>> +       if (id < 0) { >>>> +               kfree(intel_vsec_dev->resource); >>>> +               kfree(intel_vsec_dev); >>>> +               return id; >>> >>> Thanks, this looks much better this way around but it is missing >>> xa_alloc() rollback now that the order is reversed. >>> >>> Once that is fixed, >>> >>> Reviewed-by: Ilpo Järvinen >> >> I have fixed this up, adding the missing: >> >>         xa_erase(&auxdev_array, intel_vsec_dev->id); >> >> to this error-exit path while merging this. > > Thanks. Does that include the rest of the series which was all reviewed by Ilpo? Yes the entire series has been merged into the pdx86/review-hans branch now. Regards, Hans