Received: by 2002:ab2:3141:0:b0:1ed:23cc:44d1 with SMTP id i1csp2053436lqg; Mon, 4 Mar 2024 11:17:47 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUraJRa3jZjnc8QSO9BRmlirLNuB4oTD2a22vUuTDlvqMhjsf5GqQXILU2Z9eQpN8f5sUqYuyh438nnKsDTaAGerJXw/TdG2FhCUo2pVA== X-Google-Smtp-Source: AGHT+IFfxriNnrBWpbvvWAZHmUATZBROudf+IQ76qtKM6c8+RBcat2s/EVuyV9bRIYc0+RnQaOX0 X-Received: by 2002:a05:6512:3714:b0:513:13a4:95e4 with SMTP id z20-20020a056512371400b0051313a495e4mr5638680lfr.36.1709579867565; Mon, 04 Mar 2024 11:17:47 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709579867; cv=pass; d=google.com; s=arc-20160816; b=TGsfh3dXqwN3X2uZT3qng1d6g1/EjzQ1wypdLBVK6fJHNWhkamTiMXL5uIYdJtClr2 nGa6b25h3NysN1D1A9igjEncRQlk7R/C9ixczUdQU0LQTHpjqXTUdHZFqpjA6WGtwPRI Ed24u97KiQ3sAOv8OrgiQu6/gdbfVVCxqhVTASwtNSqyMVjcu6+u+YAfg8R3hW0q5ER/ L1DF8e9KywD5TXpDzr2WA+Sv3SUSaor4oos6v8t7rPxccuZm8cJZFih7NKSuBBXvyt/M vjG4y0DtF9UZC2HO3MoHLWtw/Q/DRdFkw6ksHoXWOqeZm/1EmpNSZI1FsbOJr4dGu2ZW xkSA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=syfbEJr2GnJlfyqAhSDOXBGpDGaj9JnY39rETOGvlMA=; fh=lZWHXWHrtbKOM7pL7KspkWwEiX3NyEUD1bDA7sPTdI0=; b=fjlReh0Bv2FhGGCWLONUTbzHDEaGkRQFW7oTwxpvLzpyZsHKQMxoNDPn1HeOdH50Y7 zwoKVMrUuLt1fWlHrHeYlbYsyvGQ3DvVNv7dExb7n/IEsLS1GZOPS1pkmp4lPvmCiyHo Xzjlp0LeoUYZuExqU0soe6erRyWj/YRK4L3Bv8/xF48etXaHnkpuwivqLpt5QKjHb+EK JItVAnmLIcik/RAfv3ecsTBDdBxDc1eb18PlOp185YKfxVZX7b+u42VFB+kDVeN8/7SO +5HOnJjTz82Dj7sxl3zzXJtx5N6vt+mMCOTc2C0LcZLvF4niyQbRkKa7kOquBxuH8TDw 1fIQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=netrider.rowland.org); spf=pass (google.com: domain of linux-kernel+bounces-91166-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-91166-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=harvard.edu Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id wv6-20020a170907080600b00a3e616874f3si4447611ejb.993.2024.03.04.11.17.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Mar 2024 11:17:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-91166-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=netrider.rowland.org); spf=pass (google.com: domain of linux-kernel+bounces-91166-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-91166-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=harvard.edu Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 433F01F24841 for ; Mon, 4 Mar 2024 19:17:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E7C6E79921; Mon, 4 Mar 2024 19:17:30 +0000 (UTC) Received: from netrider.rowland.org (netrider.rowland.org [192.131.102.5]) by smtp.subspace.kernel.org (Postfix) with SMTP id 4918F78B68 for ; Mon, 4 Mar 2024 19:17:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.131.102.5 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709579850; cv=none; b=rKy59BVWZdOpB8OKQZ+mT+2pmr7Zoza1r2/BL6pIiJKku4ljYQdH7GrSd+QL+bqKXm+SFfc4EqedCjoMc8XOzONB4e6aTfJ8Sw+iKKFQsKhO/ZEWwAn3okmAeUl787KQnnz3/qaf1AdDWbboS8btD6lAoyLx5xSEaiN7XGCMJ6g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709579850; c=relaxed/simple; bh=iM52eglbIOx8vfaf2uWEDUV+6TvpjT110x/Gr0FQQnA=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=tA6K40iaQq3yx6buoSzD4mo4ows6nx9u0KZP2oTeZaygHsqKjkBmS+bb5P/uGCoLSo4SllDLB+wCI4j2CH+HpioSD5/x2b8R8ozC/1lRNXEW58qPgPd0g7MbC98DhXIEg75Ivlscl0a9yvmGxIm+6qgYuWl3fVqVal3azqWeKcg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=rowland.harvard.edu; spf=pass smtp.mailfrom=netrider.rowland.org; arc=none smtp.client-ip=192.131.102.5 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=rowland.harvard.edu Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=netrider.rowland.org Received: (qmail 131377 invoked by uid 1000); 4 Mar 2024 14:17:27 -0500 Date: Mon, 4 Mar 2024 14:17:27 -0500 From: Alan Stern To: Tejun Heo , Greg KH Cc: Kernel development list Subject: Bug in sysfs_break_active_protection() Message-ID: <9c2484f4-df62-4d23-97a2-55a160eba55f@rowland.harvard.edu> References: <2024030428-graph-harmful-1597@gregkh> <416a8311-c725-419a-8b22-74c80207347f@rowland.harvard.edu> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <416a8311-c725-419a-8b22-74c80207347f@rowland.harvard.edu> Tejun: It looks like there's a memory leak in sysfs_break_active_protection(). It and its companion routine do this: struct kernfs_node *sysfs_break_active_protection(struct kobject *kobj, const struct attribute *attr) { struct kernfs_node *kn; kobject_get(kobj); kn = kernfs_find_and_get(kobj->sd, attr->name); if (kn) kernfs_break_active_protection(kn); return kn; } void sysfs_unbreak_active_protection(struct kernfs_node *kn) { struct kobject *kobj = kn->parent->priv; kernfs_unbreak_active_protection(kn); kernfs_put(kn); kobject_put(kobj); } If kn is NULL then the kobject_get(kobj) reference is never dropped. It looks like this could happen if two processes want to unregister the same kobject at the same time. Shouldn't sysfs_break_active_protection() do this? kobject_get(kobj); kn = kernfs_find_and_get(kobj->sd, attr->name); if (kn) kernfs_break_active_protection(kn); + else + kobject_put(kobj); return kn; Alan Stern