Return-path: Received: from mail-oa0-f48.google.com ([209.85.219.48]:39689 "EHLO mail-oa0-f48.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754864Ab3CFXxc (ORCPT ); Wed, 6 Mar 2013 18:53:32 -0500 Received: by mail-oa0-f48.google.com with SMTP id j1so13183304oag.7 for ; Wed, 06 Mar 2013 15:53:31 -0800 (PST) Message-ID: <5137D6F8.4050007@lwfinger.net> (sfid-20130307_005336_367394_84810A62) Date: Wed, 06 Mar 2013 17:53:28 -0600 From: Larry Finger MIME-Version: 1.0 To: Johannes Berg CC: linux-wireless Subject: Re: Memory leaks in cfg80211 and mac80211 References: <51365EBC.9080602@lwfinger.net> (sfid-20130305_220821_742055_EAAAA72D) <1362562265.8457.7.camel@jlt4.sipsolutions.net> In-Reply-To: <1362562265.8457.7.camel@jlt4.sipsolutions.net> Content-Type: text/plain; charset=UTF-8; format=flowed Sender: linux-wireless-owner@vger.kernel.org List-ID: On 03/06/2013 03:31 AM, Johannes Berg wrote: > Larry, > >> While monitoring the latest rtlwifi drivers for memory leaks, I found the >> following two in cfg80211 and mac80211: > > Thanks. > >> unreferenced object 0xffff8800b2479100 (size 256): >> comm "softirq", pid 0, jiffies 4295010840 (age 324.612s) >> hex dump (first 32 bytes): >> 00 91 47 b2 00 88 ff ff 00 91 47 b2 00 88 ff ff ..G.......G..... >> 10 91 47 b2 00 88 ff ff 10 91 47 b2 00 88 ff ff ..G.......G..... >> backtrace: >> [] kmemleak_alloc+0x21/0x50 >> [] __kmalloc+0x130/0x2c0 >> [] cfg80211_bss_update+0x148/0x870 [cfg80211] >> [] cfg80211_inform_bss_frame+0x152/0x410 [cfg80211] >> [] ieee80211_bss_info_update+0x55/0x300 [mac80211] >> [] ieee80211_scan_rx+0x11d/0x280 [mac80211] >> [] ieee80211_rx+0xcdd/0xda0 [mac80211] >> [] ieee80211_tasklet_handler+0xc3/0x320 [mac80211] > >> The first one is cleared when the module is unloaded, and is false. It is fixed >> with the following patch: > >> @@ -782,6 +783,7 @@ cfg80211_bss_update(struct cfg80211_regi >> kfree_rcu(ies, rcu_head); >> goto drop; >> } >> + kmemleak_not_leak(new); > > Hmm, not sure I understand. What part is kmemleak() having issues with? > This seems like it would hide genuine issues? This is typically stored > in a list and/or hash-table, so there should be references? Or does > kmemleak have issues with pointers to the "middle" of blocks? > > >> and >> >> unreferenced object 0xffff880079a33e00 (size 512): >> comm "softirq", pid 0, jiffies 4295010891 (age 324.412s) >> hex dump (first 32 bytes): >> 83 41 93 fe 49 02 00 00 00 00 3e 00 00 00 00 00 .A..I.....>..... >> 00 00 00 00 00 00 00 00 e4 00 00 00 00 08 6c 77 ..............lw >> backtrace: >> [] kmemleak_alloc+0x21/0x50 >> [] __kmalloc+0x130/0x2c0 >> [] cfg80211_inform_bss_frame+0xc2/0x410 [cfg80211] >> [] ieee80211_bss_info_update+0x55/0x300 [mac80211] >> [] ieee80211_scan_rx+0x11d/0x280 [mac80211] >> [] ieee80211_rx+0xcdd/0xda0 [mac80211] >> [] ieee80211_tasklet_handler+0xc3/0x320 [mac80211] >> [] tasklet_action+0x78/0x100 >> > >> The second leak is real and happens at line 954 of net/wireless/scan.c: >> >> ies = kmalloc(sizeof(*ies) + ielen, gfp); >> if (!ies) >> return NULL; >> >> As the memory allocated to ies is still used when the routine exits, I'm not >> sure where to look for the missing free. Any suggestions? > > Hmm. I looked and found one possible leak, which this should fix: > > --- a/net/wireless/scan.c > +++ b/net/wireless/scan.c > @@ -723,6 +721,8 @@ cfg80211_bss_update(struct cfg80211_registered_device *dev, > > if (found->pub.hidden_beacon_bss && > !list_empty(&found->hidden_list)) { > + const struct cfg80211_bss_ies *f; > + > /* > * The found BSS struct is one of the probe > * response members of a group, but we're > @@ -732,6 +732,10 @@ cfg80211_bss_update(struct cfg80211_registered_device *dev, > * SSID to showing it, which is confusing so > * drop this information. > */ > + > + f = rcu_access_pointer(tmp->pub.beacon_ies); > + kfree_rcu((struct cfg80211_bss_ies *)f, > + rcu_head); > goto drop; > } > > > However, that's a corner case, I don't think you ran into it. Since you > also didn't note any warnings, we can also discount a few cases that > would be code bugs and would leak. > > I wonder if this is related to the first warning? The "new" object in > the first block would typically take ownership of the "ies" object. Although I do not get any warnings, your patch and mine have made the kmemleak scan now come up clean. I will continue testing and let you know. Larry