Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp3163622rdb; Wed, 13 Sep 2023 04:16:18 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGCtoc9WjU7tAFY+M+LooMeC9WTNwf1BdpK00KRUEfxCWmu7KAZsI/IyjmuoBiUZzMJ50u8 X-Received: by 2002:a05:6a20:2592:b0:134:5c75:3d23 with SMTP id k18-20020a056a20259200b001345c753d23mr2425936pzd.18.1694603778204; Wed, 13 Sep 2023 04:16:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694603778; cv=none; d=google.com; s=arc-20160816; b=0PI4mSnUHMFxUEGW4Y3epNztPFnU16uo5Cwc2MNekUqojFn114b81syyzYcHK7UDwr IhMW7D+Z/tn0JXj0XJlCaHdogVSIFe1mp/LiP+9hXRWc2ZKx2ip7kCvNU+okPp2Gvkzl qTTC78w5nXsVneDlhIBOktS97qJaC+o8QSm2V8egj2a4ucI/N78/4NK4gu33QlHCCN40 EwHtQ9j+ilZjx0o3b3oB9sGmq6UoDQ0tlxD0K7fasP9Qg64u6/Ip0AXAGSFi0HlEO/AM InhD62APOtBpc1uXwD6DXlPxK388mamATA1vJHLiebclLOAmlfAV+vdDWfit9P+Q+pwE Z6KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=jn5ICPS6Cu3mMpYD0UB1kTuR5uyOOiABwMdLvnOtIfU=; fh=BKhaubn3NgfOFdJuURkVVw5laQp2qzBZJf/ffKnJtu8=; b=oLlWgcvlIU74WO4r0aJfTBzqC+s380ZxPHN6wT8ux3XpjZNQej8YHxBGTmSW3KVsdm xrzDzboR1l/NXXaEEels3wdKVa+elUXtkvOSRuqiG8hIzEAh6zRuzS48hi72nJQA/MAJ dH8fuaeQm9VOIE4fsNJvmRvMJE5T0qfyRj2zx3tWpGA9Nc2TLybyHERqRAWtpRJ35vs8 2FuDMZtJac3wtPuwfOkmGJwqpBzVngrlj37vPIQq4dourlKqA4GM6jn0jILzFfWFpepV wxK/Z0RUoslDZOiEOz3/mjRjdG0wTl21+I0k9odLMvhTuvhLnwYlLXx0itNuGDLI1DYV YvXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=I3scjSHf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id i4-20020a170902e48400b001b9c7300823si9429518ple.221.2023.09.13.04.16.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Sep 2023 04:16:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=I3scjSHf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id C9EDA8206D49; Wed, 13 Sep 2023 04:12:07 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240007AbjIMLL7 (ORCPT + 99 others); Wed, 13 Sep 2023 07:11:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240042AbjIMLLj (ORCPT ); Wed, 13 Sep 2023 07:11:39 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CBF9F26AA; Wed, 13 Sep 2023 04:11:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: MIME-Version:References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender :Reply-To:Content-Type:Content-ID:Content-Description; bh=jn5ICPS6Cu3mMpYD0UB1kTuR5uyOOiABwMdLvnOtIfU=; b=I3scjSHfsBsZKX4zg8bnuhQHsb L3D0sDT6s/4yq5F4to0o72PLjQG35an4Sv/o+6kBl3zPhQizwvxc1Vv94bX/s1vxKz63No7hqVkKI gWJbhENB7ONGbyTxRi9Gv1DEh0gDvIcWJHRwu1P6rs8npYTuo1UIXBtLZ38Wlebq+1FFq9+VHM7Az +jae9GXG1lqZMs+ZGJwbbUVJ6q5h0hnWc4XzoeXLC5wu+H2D0ovks788KuWtl7gm8n1P4Sxc2UGSY 8bLx9Xo2rlm7RGXwKDt0MFo2pkmo0JFDXTAIdQjuxgPocFwF+Sc8uVwpnbl8kZpZdL5Yj8yjzaPQK g2rznLfA==; Received: from [190.210.221.22] (helo=localhost) by bombadil.infradead.org with esmtpsa (Exim 4.96 #2 (Red Hat Linux)) id 1qgNm6-005i8S-0t; Wed, 13 Sep 2023 11:11:14 +0000 From: Christoph Hellwig To: Christian Brauner , Al Viro Cc: Heiko Carstens , Vasily Gorbik , Alexander Gordeev , Fenghua Yu , Reinette Chatre , Miquel Raynal , Richard Weinberger , Vignesh Raghavendra , Dennis Dalessandro , Tejun Heo , Trond Myklebust , Anna Schumaker , Kees Cook , Damien Le Moal , Naohiro Aota , Greg Kroah-Hartman , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, linux-rdma@vger.kernel.org, linux-nfs@vger.kernel.org, linux-hardening@vger.kernel.org, cgroups@vger.kernel.org Subject: [PATCH 15/19] kernfs: split ->kill_sb Date: Wed, 13 Sep 2023 08:10:09 -0300 Message-Id: <20230913111013.77623-16-hch@lst.de> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230913111013.77623-1-hch@lst.de> References: <20230913111013.77623-1-hch@lst.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SRS-Rewrite: SMTP reverse-path rewritten from by bombadil.infradead.org. See http://www.infradead.org/rpr.html Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Wed, 13 Sep 2023 04:12:08 -0700 (PDT) Split the kernfs_kill_sb helper into helpers for the new split shutdown_sb and free_sb methods. Note that resctrl has very odd locking in ->kill_sb, so this commit only releases the locking acquired in rdt_shutdown_sb in rdt_free_sb. This is not very good code and relies on ->shutdown_sb and ->free_sb to always be called in pairs, which it currently is. The next commit will try to clean this up. Signed-off-by: Christoph Hellwig --- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 12 +++++++++--- fs/kernfs/mount.c | 18 ++++++++---------- fs/sysfs/mount.c | 7 ++++--- include/linux/kernfs.h | 5 ++--- kernel/cgroup/cgroup.c | 10 ++++++---- 5 files changed, 29 insertions(+), 23 deletions(-) diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c index 725344048f85da..8db767fd80df6b 100644 --- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c +++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c @@ -2772,7 +2772,7 @@ static void rmdir_all_sub(void) kernfs_remove(kn_mondata); } -static void rdt_kill_sb(struct super_block *sb) +static void rdt_shutdown_sb(struct super_block *sb) { struct rdt_resource *r; @@ -2792,7 +2792,12 @@ static void rdt_kill_sb(struct super_block *sb) static_branch_disable_cpuslocked(&rdt_alloc_enable_key); static_branch_disable_cpuslocked(&rdt_mon_enable_key); static_branch_disable_cpuslocked(&rdt_enable_key); - kernfs_kill_sb(sb); + kernfs_shutdown_sb(sb); +} + +static void rdt_free_sb(struct super_block *sb) +{ + kernfs_free_sb(sb); mutex_unlock(&rdtgroup_mutex); cpus_read_unlock(); } @@ -2801,7 +2806,8 @@ static struct file_system_type rdt_fs_type = { .name = "resctrl", .init_fs_context = rdt_init_fs_context, .parameters = rdt_fs_parameters, - .kill_sb = rdt_kill_sb, + .shutdown_sb = rdt_shutdown_sb, + .free_sb = rdt_free_sb, }; static int mon_addfile(struct kernfs_node *parent_kn, const char *name, diff --git a/fs/kernfs/mount.c b/fs/kernfs/mount.c index d6d3cba669dbdd..32ec4ec3c878f6 100644 --- a/fs/kernfs/mount.c +++ b/fs/kernfs/mount.c @@ -379,14 +379,14 @@ void kernfs_free_fs_context(struct fs_context *fc) } /** - * kernfs_kill_sb - kill_sb for kernfs + * kernfs_shutdown_sb - shutdown_sb for kernfs * @sb: super_block being killed * - * This can be used directly for file_system_type->kill_sb(). If a kernfs - * user needs extra cleanup, it can implement its own kill_sb() and call + * This can be used directly for file_system_type->shutdown_sb(). If a kernfs + * user needs extra cleanup, it can implement its own shutdown_sb() and call * this function at the end. */ -void kernfs_kill_sb(struct super_block *sb) +void kernfs_shutdown_sb(struct super_block *sb) { struct kernfs_super_info *info = kernfs_info(sb); struct kernfs_root *root = info->root; @@ -394,13 +394,11 @@ void kernfs_kill_sb(struct super_block *sb) down_write(&root->kernfs_supers_rwsem); list_del(&info->node); up_write(&root->kernfs_supers_rwsem); +} - /* - * Remove the superblock from fs_supers/s_instances - * so we can't find it, before freeing kernfs_super_info. - */ - generic_shutdown_super(sb); - kfree(info); +void kernfs_free_sb(struct super_block *sb) +{ + kfree(kernfs_info(sb)); } static void __init kernfs_mutex_init(void) diff --git a/fs/sysfs/mount.c b/fs/sysfs/mount.c index 98467bb7673781..804391342599bc 100644 --- a/fs/sysfs/mount.c +++ b/fs/sysfs/mount.c @@ -79,18 +79,19 @@ static int sysfs_init_fs_context(struct fs_context *fc) return 0; } -static void sysfs_kill_sb(struct super_block *sb) +static void sysfs_free_sb(struct super_block *sb) { void *ns = (void *)kernfs_super_ns(sb); - kernfs_kill_sb(sb); + kernfs_free_sb(sb); kobj_ns_drop(KOBJ_NS_TYPE_NET, ns); } static struct file_system_type sysfs_fs_type = { .name = "sysfs", .init_fs_context = sysfs_init_fs_context, - .kill_sb = sysfs_kill_sb, + .shutdown_sb = kernfs_shutdown_sb, + .free_sb = sysfs_free_sb, .fs_flags = FS_USERNS_MOUNT, }; diff --git a/include/linux/kernfs.h b/include/linux/kernfs.h index 2a36f3218b5106..940059251deac8 100644 --- a/include/linux/kernfs.h +++ b/include/linux/kernfs.h @@ -453,7 +453,8 @@ int kernfs_xattr_set(struct kernfs_node *kn, const char *name, const void *kernfs_super_ns(struct super_block *sb); int kernfs_get_tree(struct fs_context *fc); void kernfs_free_fs_context(struct fs_context *fc); -void kernfs_kill_sb(struct super_block *sb); +void kernfs_shutdown_sb(struct super_block *sb); +void kernfs_free_sb(struct super_block *sb); void kernfs_init(void); @@ -572,8 +573,6 @@ static inline int kernfs_get_tree(struct fs_context *fc) static inline void kernfs_free_fs_context(struct fs_context *fc) { } -static inline void kernfs_kill_sb(struct super_block *sb) { } - static inline void kernfs_init(void) { } #endif /* CONFIG_KERNFS */ diff --git a/kernel/cgroup/cgroup.c b/kernel/cgroup/cgroup.c index 1fb7f562289d53..a6c5e6ed1b6e2d 100644 --- a/kernel/cgroup/cgroup.c +++ b/kernel/cgroup/cgroup.c @@ -2249,7 +2249,7 @@ static int cgroup_init_fs_context(struct fs_context *fc) return 0; } -static void cgroup_kill_sb(struct super_block *sb) +static void cgroup_shutdown_sb(struct super_block *sb) { struct kernfs_root *kf_root = kernfs_root_from_sb(sb); struct cgroup_root *root = cgroup_root_from_kf(kf_root); @@ -2266,14 +2266,15 @@ static void cgroup_kill_sb(struct super_block *sb) percpu_ref_kill(&root->cgrp.self.refcnt); } cgroup_put(&root->cgrp); - kernfs_kill_sb(sb); + kernfs_shutdown_sb(sb); } struct file_system_type cgroup_fs_type = { .name = "cgroup", .init_fs_context = cgroup_init_fs_context, .parameters = cgroup1_fs_parameters, - .kill_sb = cgroup_kill_sb, + .shutdown_sb = cgroup_shutdown_sb, + .free_sb = kernfs_free_sb, .fs_flags = FS_USERNS_MOUNT, }; @@ -2281,7 +2282,8 @@ static struct file_system_type cgroup2_fs_type = { .name = "cgroup2", .init_fs_context = cgroup_init_fs_context, .parameters = cgroup2_fs_parameters, - .kill_sb = cgroup_kill_sb, + .shutdown_sb = cgroup_shutdown_sb, + .free_sb = kernfs_free_sb, .fs_flags = FS_USERNS_MOUNT, }; -- 2.39.2