Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp967075ybc; Tue, 12 Nov 2019 12:01:22 -0800 (PST) X-Google-Smtp-Source: APXvYqyo1kFWCsh26s1CTKatLjlfQIbDImMOTzdPp7loQgDy4n5pRzyV27Uq0AwOVTuTeWhWK4/d X-Received: by 2002:a50:91f6:: with SMTP id h51mr34444438eda.99.1573588882436; Tue, 12 Nov 2019 12:01:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573588882; cv=none; d=google.com; s=arc-20160816; b=LGm767fWuUZ316bmbtdOjxBFYb7noQfTO1hyx6JOsQzNwoGVG326JW9soBDvn/ISbj XsBcuyysjIt0YwJGd4S6EuROm/SW+5JaUMYICY1hDCKW8Nur46JnAYBKr1LMTP8VGUBT VPgDgSPEzY43ss0hAc7SQIhWXhBSHd6Gsu3KFLHseNEsVnauz59eayUHqiwSgViQi1jF M4Hzh0VZJlhZ+mqg26mwZ1OxLutbP4mCvVf7j9lff1fLy7m3lLTDx/jT+vD8Nr1mGlYG P4SobOcsR3JELmiwlHXBiUK+fwQVanSk5S9OlH6Z+/6VC/ZmhYXzBpMeBP7jJNV1OVRJ RrfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=QPvpaBO9mcigyjY5BhuCc58SSLwiHQVgiBX3OG0q5Oo=; b=BxNoWrFMWD3m5U5SKcFax4K91WifLO4MwDmil07NWzxf8PtabBA23HsrSOsdUITPSk AW3ZPR8iYTRHynk9bcWzpuPlxkdWzy0PsCoODRjw7YvtTCFpPsYGer3VQTQl2QiSI+IS 0TwOp/cuM90SGgoRXEJ/VRnffeMCzyr3Bfts5zs7Q4zgoo93l2IQYKTA+dngA49J2XM/ oWO41wJrO5O1KHdxbe6HG7H03aOXAJgkL/AbeIjC1JoFa9XHQ4Bz5wgxBrembdHPrd/P cpnkhPll93FbfpvWPp6n6yfRCMQTcwH2V9HBn00wDMwpNseIUAUahWt+G4DkFoGlZdde wdbQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j26si712036ejy.246.2019.11.12.12.00.47; Tue, 12 Nov 2019 12:01:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726912AbfKLUAh (ORCPT + 99 others); Tue, 12 Nov 2019 15:00:37 -0500 Received: from fieldses.org ([173.255.197.46]:41356 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726376AbfKLUAh (ORCPT ); Tue, 12 Nov 2019 15:00:37 -0500 Received: by fieldses.org (Postfix, from userid 2815) id C96141C83; Tue, 12 Nov 2019 15:00:36 -0500 (EST) Date: Tue, 12 Nov 2019 15:00:36 -0500 From: "J. Bruce Fields" To: Scott Mayhew Cc: chuck.lever@oracle.com, jamie@audible.transient.net, linux-nfs@vger.kernel.org Subject: Re: [PATCH v3] nfsd: Fix cld_net->cn_tfm initialization Message-ID: <20191112200036.GC8095@fieldses.org> References: <20191112190143.12624-1-smayhew@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191112190143.12624-1-smayhew@redhat.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Thanks, applied.--b. On Tue, Nov 12, 2019 at 02:01:43PM -0500, Scott Mayhew wrote: > Don't assign an error pointer to cld_net->cn_tfm, otherwise an oops will > occur in nfsd4_remove_cld_pipe(). > > Also, move the initialization of cld_net->cn_tfm so that it occurs after > the check to see if nfsdcld is running. This is necessary because > nfsd4_client_tracking_init() looks for -ETIMEDOUT to determine whether > to use the "old" nfsdcld tracking ops. > > Fixes: 6ee95d1c8991 ("nfsd: add support for upcall version 2") > Reported-by: Jamie Heilman > Signed-off-by: Scott Mayhew > --- > fs/nfsd/nfs4recover.c | 12 +++++++----- > 1 file changed, 7 insertions(+), 5 deletions(-) > > diff --git a/fs/nfsd/nfs4recover.c b/fs/nfsd/nfs4recover.c > index cdc75ad4438b..c35c0ebaf722 100644 > --- a/fs/nfsd/nfs4recover.c > +++ b/fs/nfsd/nfs4recover.c > @@ -1578,6 +1578,7 @@ nfsd4_cld_tracking_init(struct net *net) > struct nfsd_net *nn = net_generic(net, nfsd_net_id); > bool running; > int retries = 10; > + struct crypto_shash *tfm; > > status = nfs4_cld_state_init(net); > if (status) > @@ -1586,11 +1587,6 @@ nfsd4_cld_tracking_init(struct net *net) > status = __nfsd4_init_cld_pipe(net); > if (status) > goto err_shutdown; > - nn->cld_net->cn_tfm = crypto_alloc_shash("sha256", 0, 0); > - if (IS_ERR(nn->cld_net->cn_tfm)) { > - status = PTR_ERR(nn->cld_net->cn_tfm); > - goto err_remove; > - } > > /* > * rpc pipe upcalls take 30 seconds to time out, so we don't want to > @@ -1607,6 +1603,12 @@ nfsd4_cld_tracking_init(struct net *net) > status = -ETIMEDOUT; > goto err_remove; > } > + tfm = crypto_alloc_shash("sha256", 0, 0); > + if (IS_ERR(tfm)) { > + status = PTR_ERR(tfm); > + goto err_remove; > + } > + nn->cld_net->cn_tfm = tfm; > > status = nfsd4_cld_get_version(nn); > if (status == -EOPNOTSUPP) > -- > 2.17.2