Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1811721imm; Mon, 3 Sep 2018 10:03:50 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbQEk7zx6n7FzOgm7cpvLNq4U+N+990N4jqZozvDcRvr4SemWYoBZ/YFQMTtNyElp84ZwV+ X-Received: by 2002:a63:2f45:: with SMTP id v66-v6mr26695820pgv.91.1535994230526; Mon, 03 Sep 2018 10:03:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535994230; cv=none; d=google.com; s=arc-20160816; b=xDTh7Rc7EPhYprcwOOxj9ffd1++GiwA9bsrnH0VwB/Mz8H8CAkQJgDFZBqxw1Q4RG/ sy9igWYGx0v9nD9eOrQoLwPSubylYoZfBS24jm5EBlBvcab35/G1EnA/asYat3Ei/NDn R7vwpOYQeggQC5nGsHlxCCQsaSg//Ably+qO0UKkPagmYpnKIv2iGmq8DCoBYvTv1fR4 B/2JXEvv7XbyyI7XrRyHVyD9daPT/vM+SA2QArO8KDbeuYJKM8jmMNRTNudnZjNDzcdv 5NOiJyGdRzQdAhBmnnt05Bm7onmGVevFjnDWUsjYB37lzLG7r61fR+md5xMNKy2Vmt9C ntBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=bCIV0QS67637Ra0An34VMUf/4dBe/e66/NC6cKa+wtI=; b=gD9ldfq9oReBbUHUD1EBWOoEzKQkVP7k3yU58puKBYZIbxdtsinrjsnzqcxouRwjlX kxU2hX8VKL7hKpUzDHnLACviEkHjy9YLYpTdNEvxPnU/0UpgqF79/yvWkp1GsjrjVx4U E6w5cmuNIlK+/sveUGnrl+BVM4bbdar0DNpRJQW8moB/JuOdr8tdiLG11B14w1zg925e niOj4Fkeay9gaIHmFWygtomG0z8UiIhbEj/0m3WOdtqWEy9n3BEI19fq7EWfISYs+vUa 2fkb2K8gzPE3w2XzgMmlYXUkyneN1m5SUDLcIXrU6l+kMqkAi+s2PrIft+V2S7Jf0sqA YLqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d1-v6si17639577pgj.353.2018.09.03.10.03.35; Mon, 03 Sep 2018 10:03:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729013AbeICVXc (ORCPT + 99 others); Mon, 3 Sep 2018 17:23:32 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38950 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728332AbeICVXb (ORCPT ); Mon, 3 Sep 2018 17:23:31 -0400 Received: from localhost (ip-213-127-74-90.ip.prioritytelecom.net [213.127.74.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id C224ACFC; Mon, 3 Sep 2018 17:02:30 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Miklos Szeredi Subject: [PATCH 4.4 60/80] fuse: umount should wait for all requests Date: Mon, 3 Sep 2018 18:49:38 +0200 Message-Id: <20180903164936.549627489@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180903164934.171677301@linuxfoundation.org> References: <20180903164934.171677301@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Miklos Szeredi commit b8f95e5d13f5f0191dcb4b9113113d241636e7cb upstream. fuse_abort_conn() does not guarantee that all async requests have actually finished aborting (i.e. their ->end() function is called). This could actually result in still used inodes after umount. Add a helper to wait until all requests are fully done. This is done by looking at the "num_waiting" counter. When this counter drops to zero, we can be sure that no more requests are outstanding. Fixes: 0d8e84b0432b ("fuse: simplify request abort") Cc: # v4.2 Signed-off-by: Miklos Szeredi Signed-off-by: Greg Kroah-Hartman --- fs/fuse/dev.c | 23 +++++++++++++++++++---- fs/fuse/fuse_i.h | 1 + fs/fuse/inode.c | 2 ++ 3 files changed, 22 insertions(+), 4 deletions(-) --- a/fs/fuse/dev.c +++ b/fs/fuse/dev.c @@ -143,6 +143,16 @@ static bool fuse_block_alloc(struct fuse return !fc->initialized || (for_background && fc->blocked); } +static void fuse_drop_waiting(struct fuse_conn *fc) +{ + if (fc->connected) { + atomic_dec(&fc->num_waiting); + } else if (atomic_dec_and_test(&fc->num_waiting)) { + /* wake up aborters */ + wake_up_all(&fc->blocked_waitq); + } +} + static struct fuse_req *__fuse_get_req(struct fuse_conn *fc, unsigned npages, bool for_background) { @@ -189,7 +199,7 @@ static struct fuse_req *__fuse_get_req(s return req; out: - atomic_dec(&fc->num_waiting); + fuse_drop_waiting(fc); return ERR_PTR(err); } @@ -296,7 +306,7 @@ void fuse_put_request(struct fuse_conn * if (test_bit(FR_WAITING, &req->flags)) { __clear_bit(FR_WAITING, &req->flags); - atomic_dec(&fc->num_waiting); + fuse_drop_waiting(fc); } if (req->stolen_file) @@ -382,7 +392,7 @@ static void request_end(struct fuse_conn struct fuse_iqueue *fiq = &fc->iq; if (test_and_set_bit(FR_FINISHED, &req->flags)) - goto out_put_req; + goto put_request; spin_lock(&fiq->waitq.lock); list_del_init(&req->intr_entry); @@ -412,7 +422,7 @@ static void request_end(struct fuse_conn wake_up(&req->waitq); if (req->end) req->end(fc, req); -out_put_req: +put_request: fuse_put_request(fc, req); } @@ -2192,6 +2202,11 @@ void fuse_abort_conn(struct fuse_conn *f } EXPORT_SYMBOL_GPL(fuse_abort_conn); +void fuse_wait_aborted(struct fuse_conn *fc) +{ + wait_event(fc->blocked_waitq, atomic_read(&fc->num_waiting) == 0); +} + int fuse_dev_release(struct inode *inode, struct file *file) { struct fuse_dev *fud = fuse_get_dev(file); --- a/fs/fuse/fuse_i.h +++ b/fs/fuse/fuse_i.h @@ -842,6 +842,7 @@ void fuse_request_send_background_locked /* Abort all requests */ void fuse_abort_conn(struct fuse_conn *fc); +void fuse_wait_aborted(struct fuse_conn *fc); /** * Invalidate inode attributes --- a/fs/fuse/inode.c +++ b/fs/fuse/inode.c @@ -382,6 +382,8 @@ static void fuse_put_super(struct super_ fuse_send_destroy(fc); fuse_abort_conn(fc); + fuse_wait_aborted(fc); + mutex_lock(&fuse_mutex); list_del(&fc->entry); fuse_ctl_remove_conn(fc);