From mboxrd@z Thu Jan 1 00:00:00 1970 From: Eric Dumazet Subject: Re: PROBLEM: Memory leak (at least with SLUB) from "secpath_dup" (xfrm) in 3.5+ kernels Date: Mon, 22 Oct 2012 17:16:37 +0200 Message-ID: <1350918997.8609.858.camel@edumazet-glaptop> References: <20121019205055.2b258d09@sacrilege> <20121019233632.26cf96d8@sacrilege> <20121020204958.4bc8e293@sacrilege> <20121021044540.12e8f4b7@sacrilege> <20121021062402.7c4c4cb8@sacrilege> <1350826183.13333.2243.camel@edumazet-glaptop> <20121021195701.7a5872e7@sacrilege> <20121022004332.7e3f3f29@sacrilege> <20121022015134.4de457b9@sacrilege> <1350856053.8609.217.camel@edumazet-glaptop> <20121022045850.788df346@sacrilege> <1350893743.8609.424.camel@edumazet-glaptop> <20121022180655.50a50401@sacrilege> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit Cc: Paul Moore , netdev@vger.kernel.org, linux-mm@kvack.org To: Mike Kazantsev Return-path: Received: from mail-bk0-f46.google.com ([209.85.214.46]:54963 "EHLO mail-bk0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752113Ab2JVPQm (ORCPT ); Mon, 22 Oct 2012 11:16:42 -0400 Received: by mail-bk0-f46.google.com with SMTP id jk13so1108277bkc.19 for ; Mon, 22 Oct 2012 08:16:41 -0700 (PDT) In-Reply-To: <20121022180655.50a50401@sacrilege> Sender: netdev-owner@vger.kernel.org List-ID: On Mon, 2012-10-22 at 18:06 +0600, Mike Kazantsev wrote: > On Mon, 22 Oct 2012 10:15:43 +0200 > Eric Dumazet wrote: > > > On Mon, 2012-10-22 at 04:58 +0600, Mike Kazantsev wrote: > > > > > I've grepped for "/org/free" specifically and sure enough, same scraps > > > of data seem to be in some of the (varied) dumps there. > > > > Content is not meaningful, as we dont initialize it. > > So you see previous content. > > > > Could you try the following : > > > ... > > With this patch on top of v3.7-rc2 (w/o patches from your previous > mail), leak seem to be still present. OK, I believe I found the bug in IPv4 defrag / IPv6 reasm Please test the following patch. Thanks ! diff --git a/net/ipv4/ip_fragment.c b/net/ipv4/ip_fragment.c index 448e685..0a52771 100644 --- a/net/ipv4/ip_fragment.c +++ b/net/ipv4/ip_fragment.c @@ -48,6 +48,7 @@ #include #include #include +#include /* NOTE. Logic of IP defragmentation is parallel to corresponding IPv6 * code now. If you change something here, _PLEASE_ update ipv6/reassembly.c @@ -634,6 +635,7 @@ static int ip_frag_reasm(struct ipq *qp, struct sk_buff *prev, else if (head->ip_summed == CHECKSUM_COMPLETE) head->csum = csum_add(head->csum, fp->csum); + secpath_reset(fp); if (skb_try_coalesce(head, fp, &headstolen, &delta)) { kfree_skb_partial(fp, headstolen); } else { diff --git a/net/ipv6/reassembly.c b/net/ipv6/reassembly.c index da8a4e3..4fcc463 100644 --- a/net/ipv6/reassembly.c +++ b/net/ipv6/reassembly.c @@ -55,6 +55,7 @@ #include #include #include +#include struct ip6frag_skb_cb { @@ -456,6 +457,7 @@ static int ip6_frag_reasm(struct frag_queue *fq, struct sk_buff *prev, else if (head->ip_summed == CHECKSUM_COMPLETE) head->csum = csum_add(head->csum, fp->csum); + secpath_reset(fp); if (skb_try_coalesce(head, fp, &headstolen, &delta)) { kfree_skb_partial(fp, headstolen); } else {