Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp854560imm; Fri, 8 Jun 2018 06:20:00 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIUios/vl90TU3SYncCwXtEwa+tkarDaDFfGaFdKNRhOQMjoYd1N/G6Q3x2JWk1urC3ampk X-Received: by 2002:aa7:82d9:: with SMTP id f25-v6mr6042119pfn.218.1528464000593; Fri, 08 Jun 2018 06:20:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528464000; cv=none; d=google.com; s=arc-20160816; b=abWb6KHk6Z1uHOPO+Xz9wQsH7WF5JHDAwjmpvJbCQFKkD7G7EBGd9v1N8WzLnHKLZ5 fnqQYS6xz9279Lcu07yhEmL8RDFzVn+XROUP/hWNZsCDH99UrNBP9ggqZAnAP8XVs+0y luacpseqCJK/fHdksvOAZ8GIj0AYgsXqGmn2Uy/mDQFbwgua2F7TFI1x8tj3ST9soZc0 8/3Wv9+nESoWoVXjslGrcbzBnu+Eu5ZdmlfU30+XAowzOL6Wh0Y5HgutreonocVCRg5E 8Zsewp7pWT/IIZTcRCtc98CTKbyTlJGgA0/Gb0xo+Pl7Ucariwq7Wy3muarsxrDk2Dtf B28w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=05hFdy43Uw5wm+tfZddPyZuCFrx9bTnzWGAcshAoIrU=; b=Eo2UZUDA3TTbwoaRYhqjiN5zrhBfzngWvQWomGshJ5xgIvc52heTnb5br9zmvsezEg BaUhBfZGQCwhB7esXBaGc8AtKccprVitAN1pOXntMVlBdLlg/EzBs1zfyZbtlwxwAh5r OyX91C7EzAVm7ZWDyMIIsBMQTIUeIwg1SqShpGqhRlGpIbMl9mTn4z3A1aSdjYY8tRO5 9V2vWLF9xJlKKACU4/lRdxCJDk1dab5BUwlr3MGK3EodLz/da1zMSEXlLbSVB/2zu/mF b1k3uZ26gHQ3fY5v59I9fftnaE5sOZk+GQZ70qY8z6+IDDsN7Rf3xO8IruNT6ScWVCL4 G7tQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l12-v6si4835249pgs.601.2018.06.08.06.19.45; Fri, 08 Jun 2018 06:20:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752776AbeFHNRz (ORCPT + 99 others); Fri, 8 Jun 2018 09:17:55 -0400 Received: from imap1.codethink.co.uk ([176.9.8.82]:53132 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751616AbeFHNRx (ORCPT ); Fri, 8 Jun 2018 09:17:53 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1fRHH4-0007GB-Fz; Fri, 08 Jun 2018 14:17:50 +0100 Message-ID: <1528463869.2289.92.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 017/268] do d_instantiate/unlock_new_inode combinations safely From: Ben Hutchings To: Al Viro Cc: stable@vger.kernel.org, Mike Marshall , Andreas Dilger , Greg Kroah-Hartman , linux-kernel@vger.kernel.org Date: Fri, 08 Jun 2018 14:17:49 +0100 In-Reply-To: <20180528100203.994843437@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> <20180528100203.994843437@linuxfoundation.org> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-05-28 at 11:59 +0200, Greg Kroah-Hartman wrote: > 4.4-stable review patch.  If anyone has any objections, please let me know. > > ------------------ > > From: Al Viro > > commit 1e2e547a93a00ebc21582c06ca3c6cfea2a309ee upstream. > > For anything NFS-exported we do _not_ want to unlock new inode > before it has grown an alias; original set of fixes got the > ordering right, but missed the nasty complication in case of > lockdep being enabled - unlock_new_inode() does > lockdep_annotate_inode_mutex_key(inode) > which can only be done before anyone gets a chance to touch > ->i_mutex.  Unfortunately, flipping the order and doing > unlock_new_inode() before d_instantiate() opens a window when > mkdir can race with open-by-fhandle on a guessed fhandle, leading > to multiple aliases for a directory inode and all the breakage > that follows from that. > > Correct solution: a new primitive (d_instantiate_new()) > combining these two in the right order - lockdep annotate, then > d_instantiate(), then the rest of unlock_new_inode().  All > combinations of d_instantiate() with unlock_new_inode() should > be converted to that. [...] I think you missed xfs, which has a wrapper around unlock_new_inode() called xfs_finish_inode_setup(). It looks like xfs_generic_create() and xfs_vn_symlink() still need this conversion. Ben. -- Ben Hutchings, Software Developer   Codethink Ltd https://www.codethink.co.uk/ Dale House, 35 Dale Street Manchester, M1 2HF, United Kingdom