Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1243586ybk; Thu, 14 May 2020 04:17:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzLFLNLO5+g+YEoD0YWaF1cZZHmV3GL9Xm0rbL/xOrzg9mo7X1RD0ghwnF8Aa18G8l4Luou X-Received: by 2002:a17:906:2293:: with SMTP id p19mr623006eja.14.1589455052692; Thu, 14 May 2020 04:17:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589455052; cv=none; d=google.com; s=arc-20160816; b=llybF7CiTdkRD5Su8SV+/jJts8gl2FpdctAFLdXSL0SZvCtHZwXxvvHAem267ItNsH vUSswb4nvNyd5VX8eqYAkyhZYPZBtQWpnvN4+F0O6kUPuBD2Kz1aA7OwtUkHGdtpg4I9 tiB2UARuQT4+tufTTYianWr/4+SIsxhXsgycaHe7/Dhl6d+N2z+k5WJpl0Kt2NxFwbcB gMjmLDgKRQKtKztE8veeGwq7e93DQWUD3sO6uG6Xc4P6SrG4WjiQJy/1T/qmZiLFzZsy LrghEwL8qHW+/Px1ELXMSuXaEy0bMmrun9S/s5TXSabdcybgxpIcr2pl8Ll9eHu2x4Rm or3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date; bh=E2zrdEnH7KlzmvsGslI/x9QnKF85A0dIwdPsJEyIPnw=; b=AYAI2QQ0IBP490egMKvRl67vkt4wrL7fqA+VUReaHpQSy2xHbTzlAZCP7krzOU8nul 4ZX2w+BcPkB+XAfa4soy6RUb6oE5IM7mhdCRejXl7MHdf0ybbAOtXv83qP8wyIi8/DKt RUn2yJt/P35kzUo0azUset1uo2X2je/FMf7tgG4ncFRxUANJh0m+Ul6mKwrHvxGouvF9 qvDgi6i79Fc0BDrNLQ9K/QxzqUTvWwER+HNdQhzVl5A9NDMk3Ke4tEy9SjMAStHyiyMf bFEhjMGOpRWByAp1GMyLgv4zUYB7XP8uzmFDsRyRkAfIs3xR6y760Ji6NyJm9OKrHes2 r6Vg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g12si1557264ejw.314.2020.05.14.04.17.08; Thu, 14 May 2020 04:17:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726196AbgENLO5 (ORCPT + 99 others); Thu, 14 May 2020 07:14:57 -0400 Received: from mx2.suse.de ([195.135.220.15]:60090 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725955AbgENLO5 (ORCPT ); Thu, 14 May 2020 07:14:57 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 60498B03E; Thu, 14 May 2020 11:14:58 +0000 (UTC) Received: from localhost (webern.olymp [local]) by webern.olymp (OpenSMTPD) with ESMTPA id 5cfcdbe1; Thu, 14 May 2020 12:14:53 +0100 (WEST) Date: Thu, 14 May 2020 12:14:53 +0100 From: Luis Henriques To: Jeff Layton , Ilya Dryomov Cc: ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] ceph: don't return -ESTALE if there's still an open file Message-ID: <20200514111453.GA99187@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Similarly to commit 03f219041fdb ("ceph: check i_nlink while converting a file handle to dentry"), this fixes another corner case with name_to_handle_at/open_by_handle_at. The issue has been detected by xfstest generic/467, when doing: - name_to_handle_at("/cephfs/myfile") - open("/cephfs/myfile") - unlink("/cephfs/myfile") - open_by_handle_at() The call to open_by_handle_at should not fail because the file still exists and we do have a valid handle to it. Signed-off-by: Luis Henriques --- fs/ceph/export.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/fs/ceph/export.c b/fs/ceph/export.c index 79dc06881e78..8556df9d94d0 100644 --- a/fs/ceph/export.c +++ b/fs/ceph/export.c @@ -171,12 +171,21 @@ struct inode *ceph_lookup_inode(struct super_block *sb, u64 ino) static struct dentry *__fh_to_dentry(struct super_block *sb, u64 ino) { + struct ceph_inode_info *ci; struct inode *inode = __lookup_inode(sb, ino); + if (IS_ERR(inode)) return ERR_CAST(inode); if (inode->i_nlink == 0) { - iput(inode); - return ERR_PTR(-ESTALE); + bool is_open; + ci = ceph_inode(inode); + spin_lock(&ci->i_ceph_lock); + is_open = __ceph_is_file_opened(ci); + spin_unlock(&ci->i_ceph_lock); + if (!is_open) { + iput(inode); + return ERR_PTR(-ESTALE); + } } return d_obtain_alias(inode); }