Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6555611ybx; Mon, 11 Nov 2019 10:53:21 -0800 (PST) X-Google-Smtp-Source: APXvYqyDz4VdndV40HPgQIPAF38tsaspBuWWfQDVSMbgAil1xRPzSGh6hCJOnxbiQsWzpJAv5KIb X-Received: by 2002:a17:906:7051:: with SMTP id r17mr23434104ejj.155.1573498400987; Mon, 11 Nov 2019 10:53:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573498400; cv=none; d=google.com; s=arc-20160816; b=AHrJDWUlfJHVUZMXHIPNuo/dxspfsQoR4i8CxjsY/enj00QB0NB4T309ZpHYZuAgLW Pygyfhc+qZg7fMYxOIWaiBN4Z/Jzlyu0OsSJrw9SP6VhLAO0o7YBhxG+gAmR+YGdleVe Daawr7VQ7UOgRViE4ixEFhg60Xg27cGPDhAFkT3FiV1aY5XIluIBs8KQdi+1lUMKVE+b 9RX0Sq/ds0S7PRyrqWK/hSIIv16l4kdfxWcrMnOrLtT45p0ge4CLXswqDHiBXh0jG32u gQ9/GhOc027i2VeukC6BfTRNiZ02A//yjRZr1aP40eSK85RWpxapGq59Zs9qFK1fy+IQ uQ3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=u9/+5Ni8Be0vg8yo6h6Zf31cWtGgXKXs2I9gb+CPdNY=; b=Wei5CooxbmICUBoO9xKIeFkBocKoiBOi2wRkCUD0QJqM/19N0loghYUuhJrHm6RwMU LS0Q23IQjy8Kpvxpa7yBA6GI7yEQgRBX6tpqfbg1kYNRQ4WfTqfT9kZbGU5HBXCxnFRD EumCkgC2h6Jw+RIo8eLVr+kCZH7kcc6sSmrgyRqDXaX9ZZEmu2i5b8aW17Y3pHOgurWb Jm1rzHTTqbrQVuwdOX7EOUlG81XhhOtrckoy2+aca4EzzqUIKFuAKHFlmQ+3E1pxKHUu BSrBr41wDzmCGN/YJlQanoHhq0q1/3rCPBJHZrVLY1y7Ykqs+i9A7cVf/KbwQWfrGVUq Co6g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="HKo/06GB"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 93si12607738edo.408.2019.11.11.10.52.57; Mon, 11 Nov 2019 10:53:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="HKo/06GB"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730331AbfKKSuI (ORCPT + 99 others); Mon, 11 Nov 2019 13:50:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:43706 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727468AbfKKSuG (ORCPT ); Mon, 11 Nov 2019 13:50:06 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AF867204FD; Mon, 11 Nov 2019 18:50:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573498206; bh=bBKoEvnOK/hSzQAhfsYEOcnPvPdetAAXiI9F+EJstDk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HKo/06GBQxRFJUy5ijGNpHuH/tybTJWHOBiIzOyimbh4/tZ9tSj4C9S54hSXQSnd7 79eGyVXJYC7e3fwlZmWL+Bmd4SRfmRCh6FV2wHgb2f+LcIFBA35sToY52BF2/ukmER MpeX8nmHzNl4J6V/GeQZqXGGaAdokhenVf4SzlgY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Al Viro , Jeff Layton , Ilya Dryomov Subject: [PATCH 5.3 052/193] ceph: fix RCU case handling in ceph_d_revalidate() Date: Mon, 11 Nov 2019 19:27:14 +0100 Message-Id: <20191111181504.816035684@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191111181459.850623879@linuxfoundation.org> References: <20191111181459.850623879@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Al Viro commit aa8dd816732b2bab28c54bc4d2ccf3fc8a6e0892 upstream. For RCU case ->d_revalidate() is called with rcu_read_lock() and without pinning the dentry passed to it. Which means that it can't rely upon ->d_inode remaining stable; that's the reason for d_inode_rcu(), actually. Make sure we don't reload ->d_inode there. Cc: stable@vger.kernel.org Signed-off-by: Al Viro Signed-off-by: Jeff Layton Signed-off-by: Ilya Dryomov Signed-off-by: Greg Kroah-Hartman --- fs/ceph/dir.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) --- a/fs/ceph/dir.c +++ b/fs/ceph/dir.c @@ -1553,36 +1553,37 @@ static int ceph_d_revalidate(struct dent { int valid = 0; struct dentry *parent; - struct inode *dir; + struct inode *dir, *inode; if (flags & LOOKUP_RCU) { parent = READ_ONCE(dentry->d_parent); dir = d_inode_rcu(parent); if (!dir) return -ECHILD; + inode = d_inode_rcu(dentry); } else { parent = dget_parent(dentry); dir = d_inode(parent); + inode = d_inode(dentry); } dout("d_revalidate %p '%pd' inode %p offset %lld\n", dentry, - dentry, d_inode(dentry), ceph_dentry(dentry)->offset); + dentry, inode, ceph_dentry(dentry)->offset); /* always trust cached snapped dentries, snapdir dentry */ if (ceph_snap(dir) != CEPH_NOSNAP) { dout("d_revalidate %p '%pd' inode %p is SNAPPED\n", dentry, - dentry, d_inode(dentry)); + dentry, inode); valid = 1; - } else if (d_really_is_positive(dentry) && - ceph_snap(d_inode(dentry)) == CEPH_SNAPDIR) { + } else if (inode && ceph_snap(inode) == CEPH_SNAPDIR) { valid = 1; } else { valid = dentry_lease_is_valid(dentry, flags); if (valid == -ECHILD) return valid; if (valid || dir_lease_is_valid(dir, dentry)) { - if (d_really_is_positive(dentry)) - valid = ceph_is_any_caps(d_inode(dentry)); + if (inode) + valid = ceph_is_any_caps(inode); else valid = 1; }