Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4227344imm; Wed, 30 May 2018 01:19:49 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJPsM4U/I2mLS1bEwHroc8ob0jnZuHzYpAku7Jjh2NzJLHjlTrFNoDN93iAK3iM7knadK4y X-Received: by 2002:a63:618f:: with SMTP id v137-v6mr1466309pgb.145.1527668388991; Wed, 30 May 2018 01:19:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527668388; cv=none; d=google.com; s=arc-20160816; b=XpItgw5iwzetjZ72HqUXnOvN6Q8KenITkVC8GKn0wiDgCcV1fxKZ51Q/bXflFy9wlI qc9xzhIDxOD3ET9gzYkrjeCz6gDB1OsAX0ueyoO4xNIIBc+lXOIdBYpZDjmo955jyMSJ V1nesrVJRz3XycGi3MaVpkBRF0jE6uZ+KGbwX5vEjUo2iJTB5Q5BeSLzFueaUMzyrkZI KwrmQej9VbxNuhOVSablbHo+U6vjabs5s+14s6CO+cU5fOrV58URU+9ViDPjkwGuQumX IhNYitEdJqUMgENku/CRrkaDKsN1R/QW19IdBOGWe6AniAHXiT5JfoIwLmyK+elEJINg FBaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=vM4wzLfefMTIU/JjnxfeWvePJ6qyyhHrMJwuY98o0RU=; b=GDn9Hp5TE7q3N/s9CmzK5nbIY7gfrsp8ZrImXs+u7uZpg3tvV99tMRJV73DDh6Xo9w JyIhQvG3Tx1cdPx7Gc97CpTmoveQuXav0U/iNq/VCux36DMosONjvDGmpDt1GPq1cVkP D4KUT5AI2VUESFK/MSCfJSYDFLn1LzJOZT573yKCwmmI/oYYXsAKDfm3//ObQ/S322y8 GrpFWLJeLUYd+iHJh/hn98UKUE7IkG8O5uekpma77wOJhbTZdN+R511c6q+cBZYJltzM 889aDQ5GnekkAeE5It6GPvWdVeEyqF7TUdMLaSmk/DTHYtyT0eqSF1bOEhcC2noYsDZt +JtQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=Pq3KJ7dY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p3-v6si34483107pld.408.2018.05.30.01.19.33; Wed, 30 May 2018 01:19:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@szeredi.hu header.s=google header.b=Pq3KJ7dY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S937127AbeE3ISL (ORCPT + 99 others); Wed, 30 May 2018 04:18:11 -0400 Received: from mail-ot0-f196.google.com ([74.125.82.196]:38855 "EHLO mail-ot0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S935800AbeE3ISG (ORCPT ); Wed, 30 May 2018 04:18:06 -0400 Received: by mail-ot0-f196.google.com with SMTP id n3-v6so20149945ota.5 for ; Wed, 30 May 2018 01:18:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=szeredi.hu; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=vM4wzLfefMTIU/JjnxfeWvePJ6qyyhHrMJwuY98o0RU=; b=Pq3KJ7dY0lp/5FlVMPCZD0Y80Yz81wOQ2Vu4SVFH5d57p485+afLHshcXeC+u7sQbV UKqxBW5D8KdLuo2wICWNGTfsH/59yIrO6YWlkzXloSJND03pLVaGWlfzp3JjBVLzayTu ryqNCBEPVBz3zzEVE0pqAs9rTpKyklFqgMHYk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=vM4wzLfefMTIU/JjnxfeWvePJ6qyyhHrMJwuY98o0RU=; b=E0KBYW6kzl5+qXXaQR3GZhftOC8WL4T/Hy6LJmaCasGQZTtQkwYEc0Nxj4mQ86/jDV fjR2mgcK7bEY1WvYbT+YDiNhjvakmYpBtT3HbT6HpEvdybhyLgPBUabWOuOunC9Mtmgy QWgytboqpowe8bed2C/js9RLcCna2JTtLwblIhYMmo0JB8yE0gW30eh65TPOn63Nax2G dRolpbtVcoxHHv+sZdyRA4DZQcnfd3B4z4K7MBdoxYZJkxRV26OO8REUO2a44OeKakhS FUwqyEuYqF6CmpFjLM8CIuxDg3vj96DVNIy4/43PkrJE+FHxTGd+WfCj+YGFqZeXVf9l WycQ== X-Gm-Message-State: ALKqPwdCMDZ5iuWmWb61uO0Eg++Dw4Yf8k02w6XIX+g74AcQBIRHuU84 lnyP29lhtwvHbweYTGFZv4IWeaO6u7USLtEP4/WIdw== X-Received: by 2002:a9d:30d2:: with SMTP id r18-v6mr1133366otg.221.1527668284516; Wed, 30 May 2018 01:18:04 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a9d:116f:0:0:0:0:0 with HTTP; Wed, 30 May 2018 01:18:03 -0700 (PDT) X-Originating-IP: [194.176.227.33] In-Reply-To: References: <20180529144143.16378-1-mszeredi@redhat.com> <20180529144143.16378-8-mszeredi@redhat.com> From: Miklos Szeredi Date: Wed, 30 May 2018 10:18:03 +0200 Message-ID: Subject: Re: [PATCH 07/11] ovl: make ovl_create_real() cope with vfs_mkdir() safely To: Amir Goldstein Cc: Miklos Szeredi , overlayfs , linux-fsdevel , linux-kernel Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 29, 2018 at 5:29 PM, Amir Goldstein wrote: > On Tue, May 29, 2018 at 5:41 PM, Miklos Szeredi wrote: >> From: Amir Goldstein >> >> vfs_mkdir() may succeed and leave the dentry passed to it unhashed and >> negative. ovl_create_real() is the last caller breaking when that >> happens. >> >> [amir: split re-factoring of ovl_create_temp() to prep patch >> add comment about unhashed dir after mkdir >> add pr_warn() if mkdir succeeds and lookup fails] >> >> Signed-off-by: Al Viro >> Signed-off-by: Amir Goldstein >> Signed-off-by: Miklos Szeredi >> --- >> fs/overlayfs/dir.c | 35 +++++++++++++++++++++++++++++++++-- >> 1 file changed, 33 insertions(+), 2 deletions(-) >> >> diff --git a/fs/overlayfs/dir.c b/fs/overlayfs/dir.c >> index 1b181292a624..b33d37d1a87c 100644 >> --- a/fs/overlayfs/dir.c >> +++ b/fs/overlayfs/dir.c >> @@ -114,6 +114,37 @@ int ovl_cleanup_and_whiteout(struct dentry *workdir, struct inode *dir, >> goto out; >> } >> >> +static struct dentry *ovl_mkdir_real(struct inode *dir, struct dentry *dentry, >> + umode_t mode) >> +{ >> + int err; >> + >> + err = ovl_do_mkdir(dir, dentry, mode); >> + if (err) { >> + dput(dentry); >> + return ERR_PTR(err); >> + } >> + >> + /* >> + * vfs_mkdir() may succeed and leave the dentry passed >> + * to it unhashed and negative. If that happens, try to >> + * lookup a new hashed and positive dentry. >> + */ >> + if (unlikely(d_unhashed(dentry))) { >> + struct dentry *d; >> + >> + d = lookup_one_len(dentry->d_name.name, dentry->d_parent, >> + dentry->d_name.len); >> + if (IS_ERR(d)) { >> + pr_warn("overlayfs: failed lookup after mkdir (%pd2, err=%i).\n", >> + dentry, err); >> + } >> + dput(dentry); >> + dentry = d; >> + } >> + return dentry; >> +} >> + >> struct dentry *ovl_create_real(struct inode *dir, struct dentry *newdentry, >> struct ovl_cattr *attr) >> { >> @@ -135,8 +166,8 @@ struct dentry *ovl_create_real(struct inode *dir, struct dentry *newdentry, >> break; >> >> case S_IFDIR: >> - err = ovl_do_mkdir(dir, newdentry, attr->mode); >> - break; >> + /* mkdir is special... */ >> + return ovl_mkdir_real(dir, newdentry, attr->mode); >> > > I like your version with the helper. > So do we not care about the WARN_ON below on non-instantiated dentry > for directories? or we don't need it at all? I think we do. Filesystems do all sorts of weird an unexpected things. We should definitely not assume underlying filesystem returns in any way sane result. Fixed, thanks for spotting. Miklos