Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1128869ybt; Tue, 7 Jul 2020 08:24:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxb7CEYRifvHGcvL2jq+RdA6/w8RWtWeO+KKobKTgbNiU2bEdbyzCO4FD6K2wNqSJexWPxr X-Received: by 2002:a17:906:a242:: with SMTP id bi2mr42715449ejb.243.1594135446883; Tue, 07 Jul 2020 08:24:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135446; cv=none; d=google.com; s=arc-20160816; b=iHtf5KUd3by4wx5E2QNEWgyvLoyWyQYFslE6HXKDRvLMckRtTHkDX/0xSNZz7yixNo VOkCHsDOW9T7cuKjY7Xexd5qY+I9r/FvOVj8IwyUoYY7nwsOgcRGct1e04ijwxSsnAhQ Zps0nyKiwxSfk15BUStGWWSfmCjnWhSHQiAodB5A8coohD11yQe5IC77QE49JO5D/txO FveJIxyS+9TgRQdX/jp8iXmJ0ZnydJTAOZYEVJuiihFXdOCg3kEJhnEKbDt3Md/x1+hy S5h0vMxFaO/ss4dznqCCl7ZTqZ41cWzDpb/Pj6M/pnZ47jn0wYpJfqG8swAc46HfCq7U N4HA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iweyUx5slWed1ZKY7EO/5MM8OHfn5weiHLyj1zoXzeI=; b=NhJvEMAkM9VXfuO/mz+InNlfYcsWlGiuqalAcgJs3isb2YvknJhK8x1kNyP2PLAJO4 N4xcYMeOdUugf69akRaPCm0RtfTEerKAvW0JAtw7ZOATVqiPkEwvsZE9fKhhAU8CnGXe 6L0UbXIn6VmbKADlKfPKBRFxFUQzfqmX9IN8qAYQjSflV1Mib0OhnKSuuioV3eu+N6x+ lhn41Pr5nI4YShGPY9K0VTXwNrLMZbMxCGIbWwvL+3ZHFgfc8gdm4LtURtGsbCJh+YYv e95/EHRndnFk941Xj7y9E82/RlZOKV37GdCiCQhyDgZZsNsExyuDicXVFySa/Es1i/gM kurA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YefmlcT6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bf17si14577645edb.78.2020.07.07.08.23.43; Tue, 07 Jul 2020 08:24:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YefmlcT6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729847AbgGGPW0 (ORCPT + 99 others); Tue, 7 Jul 2020 11:22:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:34752 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729832AbgGGPWR (ORCPT ); Tue, 7 Jul 2020 11:22:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 90F64206E2; Tue, 7 Jul 2020 15:22:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135337; bh=enWQb/tSchN3mf06HJzd5tVwWPwtqvnTPre9qMVaTuU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YefmlcT6eX6Oi3pUknoclTpqlM8SIEqFEDl7y3FVXW54mftJV9DRKXSZuNvSjM6Xc yg7jh/X/XPHruCRjjtGBLWgIUjalLsEW9hgKckrJYXlS3cWLFL51TND9b1iCIsFsFr ckr8cthpixN+i29gUgyx2nqDT+aNTq0XLCbCOw7c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "J. Bruce Fields" , Sasha Levin , Luo Xiaogang Subject: [PATCH 5.4 36/65] nfsd4: fix nfsdfs reference count loop Date: Tue, 7 Jul 2020 17:17:15 +0200 Message-Id: <20200707145754.219024905@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145752.417212219@linuxfoundation.org> References: <20200707145752.417212219@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: J. Bruce Fields [ Upstream commit 681370f4b00af0fcc65bbfb9f82de526ab7ceb0a ] We don't drop the reference on the nfsdfs filesystem with mntput(nn->nfsd_mnt) until nfsd_exit_net(), but that won't be called until the nfsd module's unloaded, and we can't unload the module as long as there's a reference on nfsdfs. So this prevents module unloading. Fixes: 2c830dd7209b ("nfsd: persist nfsd filesystem across mounts") Reported-and-Tested-by: Luo Xiaogang Signed-off-by: J. Bruce Fields Signed-off-by: Sasha Levin --- fs/nfsd/nfs4state.c | 8 +++++++- fs/nfsd/nfsctl.c | 22 ++++++++++++---------- fs/nfsd/nfsd.h | 3 +++ 3 files changed, 22 insertions(+), 11 deletions(-) diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index 1e8f5e281bb53..fa3dcaa82572e 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -7719,9 +7719,14 @@ nfs4_state_start_net(struct net *net) struct nfsd_net *nn = net_generic(net, nfsd_net_id); int ret; - ret = nfs4_state_create_net(net); + ret = get_nfsdfs(net); if (ret) return ret; + ret = nfs4_state_create_net(net); + if (ret) { + mntput(nn->nfsd_mnt); + return ret; + } locks_start_grace(net, &nn->nfsd4_manager); nfsd4_client_tracking_init(net); if (nn->track_reclaim_completes && nn->reclaim_str_hashtbl_size == 0) @@ -7790,6 +7795,7 @@ nfs4_state_shutdown_net(struct net *net) nfsd4_client_tracking_exit(net); nfs4_state_destroy_net(net); + mntput(nn->nfsd_mnt); } void diff --git a/fs/nfsd/nfsctl.c b/fs/nfsd/nfsctl.c index 159feae6af8ba..596ed6a42022d 100644 --- a/fs/nfsd/nfsctl.c +++ b/fs/nfsd/nfsctl.c @@ -1424,6 +1424,18 @@ static struct file_system_type nfsd_fs_type = { }; MODULE_ALIAS_FS("nfsd"); +int get_nfsdfs(struct net *net) +{ + struct nfsd_net *nn = net_generic(net, nfsd_net_id); + struct vfsmount *mnt; + + mnt = vfs_kern_mount(&nfsd_fs_type, SB_KERNMOUNT, "nfsd", NULL); + if (IS_ERR(mnt)) + return PTR_ERR(mnt); + nn->nfsd_mnt = mnt; + return 0; +} + #ifdef CONFIG_PROC_FS static int create_proc_exports_entry(void) { @@ -1452,7 +1464,6 @@ unsigned int nfsd_net_id; static __net_init int nfsd_init_net(struct net *net) { int retval; - struct vfsmount *mnt; struct nfsd_net *nn = net_generic(net, nfsd_net_id); retval = nfsd_export_init(net); @@ -1479,16 +1490,8 @@ static __net_init int nfsd_init_net(struct net *net) init_waitqueue_head(&nn->ntf_wq); seqlock_init(&nn->boot_lock); - mnt = vfs_kern_mount(&nfsd_fs_type, SB_KERNMOUNT, "nfsd", NULL); - if (IS_ERR(mnt)) { - retval = PTR_ERR(mnt); - goto out_mount_err; - } - nn->nfsd_mnt = mnt; return 0; -out_mount_err: - nfsd_reply_cache_shutdown(nn); out_drc_error: nfsd_idmap_shutdown(net); out_idmap_error: @@ -1501,7 +1504,6 @@ static __net_exit void nfsd_exit_net(struct net *net) { struct nfsd_net *nn = net_generic(net, nfsd_net_id); - mntput(nn->nfsd_mnt); nfsd_reply_cache_shutdown(nn); nfsd_idmap_shutdown(net); nfsd_export_shutdown(net); diff --git a/fs/nfsd/nfsd.h b/fs/nfsd/nfsd.h index 7a835fb7d79f7..65097324b42a0 100644 --- a/fs/nfsd/nfsd.h +++ b/fs/nfsd/nfsd.h @@ -89,6 +89,8 @@ void nfsd_destroy(struct net *net); bool i_am_nfsd(void); +int get_nfsdfs(struct net *); + struct nfsdfs_client { struct kref cl_ref; void (*cl_release)(struct kref *kref); @@ -99,6 +101,7 @@ struct dentry *nfsd_client_mkdir(struct nfsd_net *nn, struct nfsdfs_client *ncl, u32 id, const struct tree_descr *); void nfsd_client_rmdir(struct dentry *dentry); + #if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL) #ifdef CONFIG_NFSD_V2_ACL extern const struct svc_version nfsd_acl_version2; -- 2.25.1