vhost: fix leak of fds and mmaps
authorRich Lane <rich.lane@bigswitch.com>
Wed, 10 Feb 2016 18:40:55 +0000 (10:40 -0800)
committerThomas Monjalon <thomas.monjalon@6wind.com>
Fri, 19 Feb 2016 15:13:32 +0000 (16:13 +0100)
The common vhost code only supported a single mmap per device. vhost-user
worked around this by saving the address/length/fd of each mmap after the end
of the rte_virtio_memory struct. This only works if the vhost-user code frees
dev->mem, since the common code is unaware of the extra info. The
VHOST_USER_RESET_OWNER message is one situation where the common code frees
dev->mem and leaks the fds and mappings. This happens every time I shut down a
VM.

The new code calls back into the implementation (vhost-user or vhost-cuse) to
clean up these resources.

The vhost-cuse changes are only compile tested.

Signed-off-by: Rich Lane <rich.lane@bigswitch.com>
Acked-by: Yuanhan Liu <yuanhan.liu@linux.intel.com>
lib/librte_vhost/vhost-net.h
lib/librte_vhost/vhost_cuse/virtio-net-cdev.c
lib/librte_vhost/vhost_user/vhost-net-user.c
lib/librte_vhost/vhost_user/virtio-net-user.c
lib/librte_vhost/vhost_user/virtio-net-user.h
lib/librte_vhost/virtio-net.c

index c69b60b..affbd1a 100644 (file)
@@ -115,4 +115,10 @@ struct vhost_net_device_ops {
 
 
 struct vhost_net_device_ops const *get_virtio_net_callbacks(void);
+
+/*
+ * Backend-specific cleanup. Defined by vhost-cuse and vhost-user.
+ */
+void vhost_backend_cleanup(struct virtio_net *dev);
+
 #endif /* _VHOST_NET_CDEV_H_ */
index ae2c3fa..374c884 100644 (file)
@@ -421,3 +421,15 @@ int cuse_set_backend(struct vhost_device_ctx ctx, struct vhost_vring_file *file)
 
        return ops->set_backend(ctx, file);
 }
+
+void
+vhost_backend_cleanup(struct virtio_net *dev)
+{
+       /* Unmap QEMU memory file if mapped. */
+       if (dev->mem) {
+               munmap((void *)(uintptr_t)dev->mem->mapped_address,
+                       (size_t)dev->mem->mapped_size);
+               free(dev->mem);
+               dev->mem = NULL;
+       }
+}
index cb18396..6ed7669 100644 (file)
@@ -348,7 +348,6 @@ vserver_message_handler(int connfd, void *dat, int *remove)
                close(connfd);
                *remove = 1;
                free(cfd_ctx);
-               user_destroy_device(ctx);
                ops->destroy_device(ctx);
 
                return;
index 4270c98..ffce0d6 100644 (file)
@@ -94,6 +94,16 @@ free_mem_region(struct virtio_net *dev)
        }
 }
 
+void
+vhost_backend_cleanup(struct virtio_net *dev)
+{
+       if (dev->mem) {
+               free_mem_region(dev);
+               free(dev->mem);
+               dev->mem = NULL;
+       }
+}
+
 int
 user_set_mem_table(struct vhost_device_ctx ctx, struct VhostUserMsg *pmsg)
 {
@@ -344,21 +354,6 @@ user_set_vring_enable(struct vhost_device_ctx ctx,
        return 0;
 }
 
-void
-user_destroy_device(struct vhost_device_ctx ctx)
-{
-       struct virtio_net *dev = get_device(ctx);
-
-       if (dev && (dev->flags & VIRTIO_DEV_RUNNING))
-               notify_ops->destroy_device(dev);
-
-       if (dev && dev->mem) {
-               free_mem_region(dev);
-               free(dev->mem);
-               dev->mem = NULL;
-       }
-}
-
 void
 user_set_protocol_features(struct vhost_device_ctx ctx,
                           uint64_t protocol_features)
index 28213f3..559bb46 100644 (file)
@@ -61,5 +61,4 @@ int user_get_vring_base(struct vhost_device_ctx, struct vhost_vring_state *);
 int user_set_vring_enable(struct vhost_device_ctx ctx,
                          struct vhost_vring_state *state);
 
-void user_destroy_device(struct vhost_device_ctx);
 #endif
index 9059b11..196e1cf 100644 (file)
@@ -207,13 +207,7 @@ cleanup_device(struct virtio_net *dev, int destroy)
 {
        uint32_t i;
 
-       /* Unmap QEMU memory file if mapped. */
-       if (dev->mem) {
-               munmap((void *)(uintptr_t)dev->mem->mapped_address,
-                       (size_t)dev->mem->mapped_size);
-               free(dev->mem);
-               dev->mem = NULL;
-       }
+       vhost_backend_cleanup(dev);
 
        for (i = 0; i < dev->virt_qp_nb; i++) {
                cleanup_vq(dev->virtqueue[i * VIRTIO_QNUM + VIRTIO_RXQ], destroy);