Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1827193imm; Mon, 3 Sep 2018 10:27:20 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZWte8CAtoFhr4uSfu7M7/1Y15QlQSPfOMgaiz8hV+0OtOhJmV+x2zgJaIQRO9J+xwx1Cf+ X-Received: by 2002:a17:902:558f:: with SMTP id g15-v6mr29520205pli.38.1535995640104; Mon, 03 Sep 2018 10:27:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535995640; cv=none; d=google.com; s=arc-20160816; b=p2nVWA68iXGXMpkE5FnOOslipqpf9li99nJL0noB4ZHFAY6jZdC9elFbc8lGbCf4cC kmFzXx+JUucmKXKCVrLji8FlhBPNAvVm0ktkw5/dfyFlB2X6hbnnXsXENKu7Tr0CZ6It TGw91F08SwK4OF/+XFo3z9aCjINrEy6HyIwW2nxJx5YGZwrVun/PANu80RDdP4ZYxneG NeTPIg57nfjvMaiGOXXdCewi/ycFpKMaorACbTdzV3HcTV10TmbmgvkeGO3P0+t2HTHI kieH4N0+ExNFfZVdu4Js0gnOCSSv+mpakvmMHZX/q1z/+kabLpgcMIf5USsY7bVQfBun 7j5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=85u/39Od5FThMagJuewjkroTb9QSvBieqmey+XPiOFo=; b=p6iKwnBSTUsq/U6acg1RvIVxIMKnbtjQBfqtnC9gKi7hkYOmXGElrYn0ShnxpaDlDj wV7V3CS7lLyYxIvJfJlhy742PkFBqGeYA/3UfH7iO1I7Z4nvJ1DxIHqXMyFUK1LookS3 QAXz7wbZN2CNcue6MBanmvaBAAh6LspyAi27rRQrCWoa5g/FtOIOxSqRZCXGjWm4uZVj d+uzUKU9g/d00WbpFylT7MjSrpDZRtjzs2GUp/j0j/ACFIi0HxCddRoNGCJ3kREiRMB+ 5f6ZEe3AzyPTjkWomMkM102BfIxa4cMtGQAu5FNLIBQF19FBZ4j1+FbwBOMVvAYDa6GR D7Og== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m5-v6si21105219pfb.104.2018.09.03.10.27.05; Mon, 03 Sep 2018 10:27:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730684AbeICVqq (ORCPT + 99 others); Mon, 3 Sep 2018 17:46:46 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45768 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728380AbeICVqp (ORCPT ); Mon, 3 Sep 2018 17:46:45 -0400 Received: from localhost (ip-213-127-74-90.ip.prioritytelecom.net [213.127.74.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id E8122D24; Mon, 3 Sep 2018 17:25:36 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Miklos Szeredi Subject: [PATCH 4.14 122/165] fuse: umount should wait for all requests Date: Mon, 3 Sep 2018 18:56:48 +0200 Message-Id: <20180903165701.670340768@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180903165655.003605184@linuxfoundation.org> References: <20180903165655.003605184@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Miklos Szeredi commit b8f95e5d13f5f0191dcb4b9113113d241636e7cb upstream. fuse_abort_conn() does not guarantee that all async requests have actually finished aborting (i.e. their ->end() function is called). This could actually result in still used inodes after umount. Add a helper to wait until all requests are fully done. This is done by looking at the "num_waiting" counter. When this counter drops to zero, we can be sure that no more requests are outstanding. Fixes: 0d8e84b0432b ("fuse: simplify request abort") Cc: # v4.2 Signed-off-by: Miklos Szeredi Signed-off-by: Greg Kroah-Hartman --- fs/fuse/dev.c | 23 +++++++++++++++++++---- fs/fuse/fuse_i.h | 1 + fs/fuse/inode.c | 2 ++ 3 files changed, 22 insertions(+), 4 deletions(-) --- a/fs/fuse/dev.c +++ b/fs/fuse/dev.c @@ -131,6 +131,16 @@ static bool fuse_block_alloc(struct fuse return !fc->initialized || (for_background && fc->blocked); } +static void fuse_drop_waiting(struct fuse_conn *fc) +{ + if (fc->connected) { + atomic_dec(&fc->num_waiting); + } else if (atomic_dec_and_test(&fc->num_waiting)) { + /* wake up aborters */ + wake_up_all(&fc->blocked_waitq); + } +} + static struct fuse_req *__fuse_get_req(struct fuse_conn *fc, unsigned npages, bool for_background) { @@ -171,7 +181,7 @@ static struct fuse_req *__fuse_get_req(s return req; out: - atomic_dec(&fc->num_waiting); + fuse_drop_waiting(fc); return ERR_PTR(err); } @@ -278,7 +288,7 @@ void fuse_put_request(struct fuse_conn * if (test_bit(FR_WAITING, &req->flags)) { __clear_bit(FR_WAITING, &req->flags); - atomic_dec(&fc->num_waiting); + fuse_drop_waiting(fc); } if (req->stolen_file) @@ -364,7 +374,7 @@ static void request_end(struct fuse_conn struct fuse_iqueue *fiq = &fc->iq; if (test_and_set_bit(FR_FINISHED, &req->flags)) - goto out_put_req; + goto put_request; spin_lock(&fiq->waitq.lock); list_del_init(&req->intr_entry); @@ -393,7 +403,7 @@ static void request_end(struct fuse_conn wake_up(&req->waitq); if (req->end) req->end(fc, req); -out_put_req: +put_request: fuse_put_request(fc, req); } @@ -2141,6 +2151,11 @@ void fuse_abort_conn(struct fuse_conn *f } EXPORT_SYMBOL_GPL(fuse_abort_conn); +void fuse_wait_aborted(struct fuse_conn *fc) +{ + wait_event(fc->blocked_waitq, atomic_read(&fc->num_waiting) == 0); +} + int fuse_dev_release(struct inode *inode, struct file *file) { struct fuse_dev *fud = fuse_get_dev(file); --- a/fs/fuse/fuse_i.h +++ b/fs/fuse/fuse_i.h @@ -852,6 +852,7 @@ void fuse_request_send_background_locked /* Abort all requests */ void fuse_abort_conn(struct fuse_conn *fc); +void fuse_wait_aborted(struct fuse_conn *fc); /** * Invalidate inode attributes --- a/fs/fuse/inode.c +++ b/fs/fuse/inode.c @@ -400,6 +400,8 @@ static void fuse_put_super(struct super_ fuse_send_destroy(fc); fuse_abort_conn(fc); + fuse_wait_aborted(fc); + mutex_lock(&fuse_mutex); list_del(&fc->entry); fuse_ctl_remove_conn(fc);