Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1347198pxb; Sat, 15 Jan 2022 09:26:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJy4CQOrxbVW2grdLF33jbeDNceOb3rwzgWnK4zDVfEnclfz1IW8ZpG8iytmig4udKnwlrS6 X-Received: by 2002:a17:906:dfea:: with SMTP id lc10mr11730425ejc.459.1642267603314; Sat, 15 Jan 2022 09:26:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642267603; cv=none; d=google.com; s=arc-20160816; b=N2HQIkTyYsoRia9jJEolt0r/l8o1WtVavAjPzg9wgR3zd3G6ggM8pDkTj8ys3loY3V MT/unFlbAOpG8uuMSPKnFHWa6xVimPPZfyYI6TfOolcOeizj83uCRWmokvpEtV9vUfEX rJ69ejQ+Xqxb+u53eCRGfcwB1if9gBj+eUbC0dzyRRqXC4/Nmgg8fETDQo3ZkiWg1xWF +umU7Zak16Dd3a+zz/H5hnKWISTrvdyAFqi0U6WJ0sNz3v8RvJ5EMSgTnEvLR/1Mjh2z vg2J3/ssvIznJGKaf2PFYGV5SFmrOPn+ncQr/ocpLYk0DMYHpY+IqteepBhv4vp88mJW 4Usw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=vVDtu0B1Xk06WgHz9JOWuU7YKItkucfuNZHN3Q1uCBo=; b=NaJn4WyNXAnORGJJAfdRykYlfHN4GwAYS1ydTqBoxQlm1qhPfIDpgkPjxCYfHcNhLN t93Yu5LL57VJJ0D3IhtL6ZhSJTw7uyR5Kdw9kcaA7fF0UhlTm7hxO0f+D7LkgUiTluml uq3jqruP1eSItpXUWFLYYKF/il6sGeXGDjSk1EMMo7isJLKmRKdPw762ylDcZWZumgL+ cGfCX02CSpQg7dMa7WdymloKrlpzk4cs3SPjILCFwGkq8FofbN2jYS1BzlK2eMPBSt1w 0GDmSAwCKhPJYdZbfvMZw8f2qvAaic0BHgGFUf2mVNqKSpFvnZKoE8b2B65qGiP+6DUQ FsvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hb38si5108438ejc.636.2022.01.15.09.26.19; Sat, 15 Jan 2022 09:26:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232614AbiAOGix (ORCPT + 99 others); Sat, 15 Jan 2022 01:38:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42016 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232594AbiAOGiw (ORCPT ); Sat, 15 Jan 2022 01:38:52 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 91B11C061574; Fri, 14 Jan 2022 22:38:52 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1n8chz-0025ZF-G2; Sat, 15 Jan 2022 06:38:39 +0000 Date: Sat, 15 Jan 2022 06:38:39 +0000 From: Al Viro To: Ian Kent Cc: Brian Foster , "Darrick J. Wong" , Christoph Hellwig , Miklos Szeredi , David Howells , Kernel Mailing List , linux-fsdevel , xfs Subject: Re: [PATCH] vfs: check dentry is still valid in get_link() Message-ID: References: <164180589176.86426.501271559065590169.stgit@mickey.themaw.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <164180589176.86426.501271559065590169.stgit@mickey.themaw.net> Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 10, 2022 at 05:11:31PM +0800, Ian Kent wrote: > When following a trailing symlink in rcu-walk mode it's possible for > the dentry to become invalid between the last dentry seq lock check > and getting the link (eg. an unlink) leading to a backtrace similar > to this: > > crash> bt > PID: 10964 TASK: ffff951c8aa92f80 CPU: 3 COMMAND: "TaniumCX" > … > #7 [ffffae44d0a6fbe0] page_fault at ffffffff8d6010fe > [exception RIP: unknown or invalid address] > RIP: 0000000000000000 RSP: ffffae44d0a6fc90 RFLAGS: 00010246 > RAX: ffffffff8da3cc80 RBX: ffffae44d0a6fd30 RCX: 0000000000000000 > RDX: ffffae44d0a6fd98 RSI: ffff951aa9af3008 RDI: 0000000000000000 > RBP: 0000000000000000 R8: ffffae44d0a6fb94 R9: 0000000000000000 > R10: ffff951c95d8c318 R11: 0000000000080000 R12: ffffae44d0a6fd98 > R13: ffff951aa9af3008 R14: ffff951c8c9eb840 R15: 0000000000000000 > ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 > #8 [ffffae44d0a6fc90] trailing_symlink at ffffffff8cf24e61 > #9 [ffffae44d0a6fcc8] path_lookupat at ffffffff8cf261d1 > #10 [ffffae44d0a6fd28] filename_lookup at ffffffff8cf2a700 > #11 [ffffae44d0a6fe40] vfs_statx at ffffffff8cf1dbc4 > #12 [ffffae44d0a6fe98] __do_sys_newstat at ffffffff8cf1e1f9 > #13 [ffffae44d0a6ff38] do_syscall_64 at ffffffff8cc0420b > > Most of the time this is not a problem because the inode is unchanged > while the rcu read lock is held. > > But xfs can re-use inodes which can result in the inode ->get_link() > method becoming invalid (or NULL). Without an RCU delay? Then we have much worse problems... Details, please.