Received: by 10.213.65.68 with SMTP id h4csp16775imn; Mon, 19 Mar 2018 18:01:31 -0700 (PDT) X-Google-Smtp-Source: AG47ELvPqLZA+yA/ZN+4PKGqyEotg8MrOcGXH/KGVJJybGd7PKV7RjJRomGmM9ip/u1r2EfsPGpl X-Received: by 2002:a17:902:bf43:: with SMTP id u3-v6mr14100751pls.227.1521507690965; Mon, 19 Mar 2018 18:01:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521507690; cv=none; d=google.com; s=arc-20160816; b=MfJ7ab34NrmvP6XOjRZ9UF96U1MklvYz37lZjX7OcttkYCWTvZDfkkQEuRvqiWUbcO ONc4s9+pdCVBpOyL/IJtAJoJx8dPknoV3IPxEWfCUaM2lv+nykXYjj7Gp2fti6FdIZ4L XBkicDX3Hu1Jgt5J/nn/zsujc9yC1BNHesdbbZ6slrmQhu+Zjzpwwc7lFs1SWilCsRqW N98KOxqpcA2r1VlWoEVhAllnLYbUDoa4VOmmvmkozAO7lOj9zG7WLHzXnaIH09IVLiKN +gCx4xaxlQJtWZcCA2U+4r2mlMJcOuYOKEJEwjzkCUnFZFb5QbWyWB/BUNx/Z6R3oQXG ytOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=3j4WS6zk7WLaJwHdmEzqJc5j8jMUkYuqiHq9p2A/cVg=; b=xhaucz89r97KHNQaSaeFD0JcZGHdIrPpH3vqJMv6k6Uh8SePyezHwTRoXESgIuwqX4 Ddv+neY/Zl0J9tSeo16KbCTd6f0oO5TsGq7A7Z5rA8rMA3pEb7AmLow/iergQvA8oxRf XGXz6JohrdpRR6/gor1EVly1bJ4443nrWCXGiDCeuiA915nbbblxR+Bp75cQm7RUNEdJ OlgZvvLVjfEVygR51/KAjzis5KuLvuySddgcDGAJDOt53iWJZX3Kjlbo+/0sqG8X1hAJ CfN8WnGbn4I+I8UZVqAAfFCs3yPc/OxxovnXRkzoHxN1G2iIdmTM3s2Olnkvm7OoqQ23 j3YA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s65si341790pgb.95.2018.03.19.18.01.15; Mon, 19 Mar 2018 18:01:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S970189AbeCSSbp (ORCPT + 99 others); Mon, 19 Mar 2018 14:31:45 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:53634 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S970167AbeCSSbk (ORCPT ); Mon, 19 Mar 2018 14:31:40 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 36664103C; Mon, 19 Mar 2018 18:31:40 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Al Viro , "Eric W. Biederman" , Al Viro Subject: [PATCH 4.15 20/52] fs: Teach path_connected to handle nfs filesystems with multiple roots. Date: Mon, 19 Mar 2018 19:08:18 +0100 Message-Id: <20180319180736.253807141@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180319180734.976730813@linuxfoundation.org> References: <20180319180734.976730813@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric W. Biederman commit 95dd77580ccd66a0da96e6d4696945b8cea39431 upstream. On nfsv2 and nfsv3 the nfs server can export subsets of the same filesystem and report the same filesystem identifier, so that the nfs client can know they are the same filesystem. The subsets can be from disjoint directory trees. The nfsv2 and nfsv3 filesystems provides no way to find the common root of all directory trees exported form the server with the same filesystem identifier. The practical result is that in struct super s_root for nfs s_root is not necessarily the root of the filesystem. The nfs mount code sets s_root to the root of the first subset of the nfs filesystem that the kernel mounts. This effects the dcache invalidation code in generic_shutdown_super currently called shrunk_dcache_for_umount and that code for years has gone through an additional list of dentries that might be dentry trees that need to be freed to accomodate nfs. When I wrote path_connected I did not realize nfs was so special, and it's hueristic for avoiding calling is_subdir can fail. The practical case where this fails is when there is a move of a directory from the subtree exposed by one nfs mount to the subtree exposed by another nfs mount. This move can happen either locally or remotely. With the remote case requiring that the move directory be cached before the move and that after the move someone walks the path to where the move directory now exists and in so doing causes the already cached directory to be moved in the dcache through the magic of d_splice_alias. If someone whose working directory is in the move directory or a subdirectory and now starts calling .. from the initial mount of nfs (where s_root == mnt_root), then path_connected as a heuristic will not bother with the is_subdir check. As s_root really is not the root of the nfs filesystem this heuristic is wrong, and the path may actually not be connected and path_connected can fail. The is_subdir function might be cheap enough that we can call it unconditionally. Verifying that will take some benchmarking and the result may not be the same on all kernels this fix needs to be backported to. So I am avoiding that for now. Filesystems with snapshots such as nilfs and btrfs do something similar. But as the directory tree of the snapshots are disjoint from one another and from the main directory tree rename won't move things between them and this problem will not occur. Cc: stable@vger.kernel.org Reported-by: Al Viro Fixes: 397d425dc26d ("vfs: Test for and handle paths that are unreachable from their mnt_root") Signed-off-by: "Eric W. Biederman" Signed-off-by: Al Viro Signed-off-by: Greg Kroah-Hartman --- fs/namei.c | 5 +++-- fs/nfs/super.c | 2 ++ include/linux/fs.h | 1 + 3 files changed, 6 insertions(+), 2 deletions(-) --- a/fs/namei.c +++ b/fs/namei.c @@ -578,9 +578,10 @@ static int __nd_alloc_stack(struct namei static bool path_connected(const struct path *path) { struct vfsmount *mnt = path->mnt; + struct super_block *sb = mnt->mnt_sb; - /* Only bind mounts can have disconnected paths */ - if (mnt->mnt_root == mnt->mnt_sb->s_root) + /* Bind mounts and multi-root filesystems can have disconnected paths */ + if (!(sb->s_iflags & SB_I_MULTIROOT) && (mnt->mnt_root == sb->s_root)) return true; return is_subdir(path->dentry, mnt->mnt_root); --- a/fs/nfs/super.c +++ b/fs/nfs/super.c @@ -2631,6 +2631,8 @@ struct dentry *nfs_fs_mount_common(struc /* initial superblock/root creation */ mount_info->fill_super(s, mount_info); nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned); + if (!(server->flags & NFS_MOUNT_UNSHARED)) + s->s_iflags |= SB_I_MULTIROOT; } mntroot = nfs_get_root(s, mount_info->mntfh, dev_name); --- a/include/linux/fs.h +++ b/include/linux/fs.h @@ -1312,6 +1312,7 @@ extern int send_sigurg(struct fown_struc #define SB_I_CGROUPWB 0x00000001 /* cgroup-aware writeback enabled */ #define SB_I_NOEXEC 0x00000002 /* Ignore executables on this fs */ #define SB_I_NODEV 0x00000004 /* Ignore devices on this fs */ +#define SB_I_MULTIROOT 0x00000008 /* Multiple roots to the dentry tree */ /* sb->s_iflags to limit user namespace mounts */ #define SB_I_USERNS_VISIBLE 0x00000010 /* fstype already mounted */