Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3440639pxk; Mon, 28 Sep 2020 18:32:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxrPbbf7WOOTZgjcAiTCQr/XEJU9PL1eXa/41Yhgnb5seWn/Q0gH4fgdzONObtfLWFNoI+p X-Received: by 2002:a50:fe82:: with SMTP id d2mr778923edt.86.1601343178460; Mon, 28 Sep 2020 18:32:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601343178; cv=none; d=google.com; s=arc-20160816; b=GK46P0DQ3xixaD+3uGjKYnZWJDbK0RtBC511VJYG1oJzLTrDZGgi1rKh68zrlHTrwx Uc3nQ+mcy39s/fwktLz9/ty0fYMI5AzU07r4Pam9uZscn1rZG0VO6qwi3+pqHugg7FPN lqawQVQFD0V655CBcgjfLRej6NydgNxxmmoW25rzasYE9SL/efMT3OTNlwGaMsHsUOdx tL513WeAIFGbeVUBFq9xpnKdYZ4456X+qnUF7DiEhKlR78ai47Ne3CpL+6V40OhasRl8 Dg0tmynMHKY/4RBjmveRuoq+2Rzez66iQf5Gm7VhFvPA0FTU+FMdKWIA3tUJsQsrm7pV jFVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=qbFkYBB9WFnBABkYTBDPS9zmoZpYJQvB0qyPs0gBEZM=; b=wY4ok8DnwMVe+eDf06WRcKQHt+xLa52HHrJz16KTiKslXOjubn52WnbDVLXV/muPgd P1iAUYwR71IJsgMgaqTUTszNWGwxVwhcOvgZdA7XMr+r5Fl0JwbDN+K8VK6Vg0Ygbx/b oSjLr0TxZDwfsz454zz+J6HBgd+A9BKg7KXBG6P8qMYHbQohE8XdE4scdcjkTJDNhJFQ yNA/jPn4Krf0PK4aIQmk9kXQGkWEoqK2rk3Hb8/bYHn+xtU7oYXJnO+2910sTOBsfpIJ xZI/d7thPyXFh/nHeTrdBuhnV4YhR0GXJhNuCWUmNVT1pXzO09eXmXGmcU1xOlufXGzw qF5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rDepNv6g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p12si558792edy.315.2020.09.28.18.32.31; Mon, 28 Sep 2020 18:32:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rDepNv6g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727441AbgI2Bay (ORCPT + 99 others); Mon, 28 Sep 2020 21:30:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:39808 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727403AbgI2Baq (ORCPT ); Mon, 28 Sep 2020 21:30:46 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9B0722080A; Tue, 29 Sep 2020 01:30:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601343045; bh=v8mPSQ00nISryPrevDPI2jzk6QquExntIyYdIQwnEm8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rDepNv6g/2O9bqCqvHkgilqaNs3ILZupCGX/JZm7SA6PdTJm9kTVJyiKs1mLAEZUm OQ8l+bJcj8XqSuMXlzL3zgIHzXIsa5r1pnOOB4BdE4/nSuV6CwdJYxgvugR/P8hxlZ ZNiFUgUSXk9eb4wd9uy5TM43McWA6/jvSVfHuIa4= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Chaitanya Kulkarni , Christoph Hellwig , Sasha Levin , linux-nvme@lists.infradead.org Subject: [PATCH AUTOSEL 5.8 13/29] nvme-core: get/put ctrl and transport module in nvme_dev_open/release() Date: Mon, 28 Sep 2020 21:30:10 -0400 Message-Id: <20200929013027.2406344-13-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200929013027.2406344-1-sashal@kernel.org> References: <20200929013027.2406344-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chaitanya Kulkarni [ Upstream commit 52a3974feb1a3eec25d8836d37a508b67b0a9cd0 ] Get and put the reference to the ctrl in the nvme_dev_open() and nvme_dev_release() before and after module get/put for ctrl in char device file operations. Introduce char_dev relase function, get/put the controller and module which allows us to fix the potential Oops which can be easily reproduced with a passthru ctrl (although the problem also exists with pure user access): Entering kdb (current=0xffff8887f8290000, pid 3128) on processor 30 Oops: (null) due to oops @ 0xffffffffa01019ad CPU: 30 PID: 3128 Comm: bash Tainted: G W OE 5.8.0-rc4nvme-5.9+ #35 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.4 RIP: 0010:nvme_free_ctrl+0x234/0x285 [nvme_core] Code: 57 10 a0 e8 73 bf 02 e1 ba 3d 11 00 00 48 c7 c6 98 33 10 a0 48 c7 c7 1d 57 10 a0 e8 5b bf 02 e1 8 RSP: 0018:ffffc90001d63de0 EFLAGS: 00010246 RAX: ffffffffa05c0440 RBX: ffff8888119e45a0 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff8888177e9550 RDI: ffff8888119e43b0 RBP: ffff8887d4768000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: ffffc90001d63c90 R12: ffff8888119e43b0 R13: ffff8888119e5108 R14: dead000000000100 R15: ffff8888119e5108 FS: 00007f1ef27b0740(0000) GS:ffff888817600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffa05c0470 CR3: 00000007f6bee000 CR4: 00000000003406e0 Call Trace: device_release+0x27/0x80 kobject_put+0x98/0x170 nvmet_passthru_ctrl_disable+0x4a/0x70 [nvmet] nvmet_passthru_enable_store+0x4c/0x90 [nvmet] configfs_write_file+0xe6/0x150 vfs_write+0xba/0x1e0 ksys_write+0x5f/0xe0 do_syscall_64+0x52/0xb0 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f1ef1eb2840 Code: Bad RIP value. RSP: 002b:00007fffdbff0eb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1ef1eb2840 RDX: 0000000000000002 RSI: 00007f1ef27d2000 RDI: 0000000000000001 RBP: 00007f1ef27d2000 R08: 000000000000000a R09: 00007f1ef27b0740 R10: 0000000000000001 R11: 0000000000000246 R12: 00007f1ef2186400 R13: 0000000000000002 R14: 0000000000000001 R15: 0000000000000000 With this patch fix we take the module ref count in nvme_dev_open() and release that ref count in newly introduced nvme_dev_release(). Signed-off-by: Chaitanya Kulkarni Signed-off-by: Christoph Hellwig Signed-off-by: Sasha Levin --- drivers/nvme/host/core.c | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/drivers/nvme/host/core.c b/drivers/nvme/host/core.c index f2556f0ea20dc..69165a8f7c1f0 100644 --- a/drivers/nvme/host/core.c +++ b/drivers/nvme/host/core.c @@ -3060,10 +3060,24 @@ static int nvme_dev_open(struct inode *inode, struct file *file) return -EWOULDBLOCK; } + nvme_get_ctrl(ctrl); + if (!try_module_get(ctrl->ops->module)) + return -EINVAL; + file->private_data = ctrl; return 0; } +static int nvme_dev_release(struct inode *inode, struct file *file) +{ + struct nvme_ctrl *ctrl = + container_of(inode->i_cdev, struct nvme_ctrl, cdev); + + module_put(ctrl->ops->module); + nvme_put_ctrl(ctrl); + return 0; +} + static int nvme_dev_user_cmd(struct nvme_ctrl *ctrl, void __user *argp) { struct nvme_ns *ns; @@ -3126,6 +3140,7 @@ static long nvme_dev_ioctl(struct file *file, unsigned int cmd, static const struct file_operations nvme_dev_fops = { .owner = THIS_MODULE, .open = nvme_dev_open, + .release = nvme_dev_release, .unlocked_ioctl = nvme_dev_ioctl, .compat_ioctl = compat_ptr_ioctl, }; -- 2.25.1