Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3372541pxb; Mon, 17 Jan 2022 18:55:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJzNxZsn5C+WSXha9ovwQb6cVgg0pLusnLvGds5mSbPv0EaCT547JdO1YdtVVSJ+8hpQpUHj X-Received: by 2002:a17:90b:164c:: with SMTP id il12mr13780176pjb.123.1642474537447; Mon, 17 Jan 2022 18:55:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642474537; cv=none; d=google.com; s=arc-20160816; b=gIsgfoG+8d+2swKaFDhUXWjLS5N9QB8JCMGi7ZhkYn3KA6SHn1CtgdQdvG2G1NdsEg Yzhp4pk+cP8uOZLEKhfvN/au2SlCe3LgsWJ7Fa5/UinJjYbhyVJHClisUydFRP/YqJPo GoB4OP2OOQWVqQr4KmhCzrCy6OswMvsi6E6xn2QAuunIDhYnSZdXg7A5D8NnBwcCoV0G KqX6ab0hlXkgQitRz+JyfEAE0uWlAmT06Uxcc/E3o0t6ay2ilPBILBwlMFxjJKTucnyl tgxa4dUX0sv2k2PWw9Dx+SknOfY7yLKZ0D/tZbNgGLdlujDaGYBRirLreB5WHMksZyqs 35Hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=Jz3zHzNSYurGQhQvj05XdEnTKexJ6//I4nUefJuJGyk=; b=F3FZtLegfURwv4r58IPUD9DNb8TVLurUnq9OtH0/pPLGlFJ9IPg2Ez8o6N/+amK8D3 DdGMZqAmv3N4lUbRJi5zo3JnoiDMm3HDkAWjEDTJbNy8x8WAHtrZEr9puKIwuH6WRzrB RMNidIacfnHNId5/pbVSXqLSdJBFrOwdPn7M2l1xA/VrIFzPgACMAEvlI8YyhCzuT7ST XaPJpowO1TC8MZPvq1Gorrxw76sHjfJ73ceWKT9yMkv2UvfjJsXgQmPd8bFURyNxYML/ OrOIcZLqWVgQj4FJ514S9rmgAvo1QRGDYgnxlpdPdDGc0Jlgjbpd+IOTEgidPToJawSZ 92Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 11si10330206pge.380.2022.01.17.18.55.24; Mon, 17 Jan 2022 18:55:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242254AbiAQSKo (ORCPT + 99 others); Mon, 17 Jan 2022 13:10:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33756 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232426AbiAQSKn (ORCPT ); Mon, 17 Jan 2022 13:10:43 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3FB59C061574; Mon, 17 Jan 2022 10:10:43 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1n9WSi-002cYU-40; Mon, 17 Jan 2022 18:10:36 +0000 Date: Mon, 17 Jan 2022 18:10:36 +0000 From: Al Viro To: Brian Foster Cc: Ian Kent , "Darrick J. Wong" , Christoph Hellwig , Miklos Szeredi , David Howells , Kernel Mailing List , linux-fsdevel , xfs Subject: Re: [PATCH] vfs: check dentry is still valid in get_link() Message-ID: References: <164180589176.86426.501271559065590169.stgit@mickey.themaw.net> <275358741c4ee64b5e4e008d514876ed4ec1071c.camel@themaw.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 17, 2022 at 04:28:52PM +0000, Al Viro wrote: > IOW, ->free_inode() is RCU-delayed part of ->destroy_inode(). If both > are present, ->destroy_inode() will be called synchronously, followed > by ->free_inode() from RCU callback, so you can have both - moving just > the "finally mark for reuse" part into ->free_inode() would be OK. > Any blocking stuff (if any) can be left in ->destroy_inode()... BTW, we *do* have a problem with ext4 fast symlinks. Pathwalk assumes that strings it parses are not changing under it. There are rather delicate dances in dcache lookups re possibility of ->d_name contents changing under it, but the search key is assumed to be stable. What's more, there's a correctness issue even if we do not oops. Currently we do not recheck ->d_seq of symlink dentry when we dismiss the symlink from the stack. After all, we'd just finished traversing what used to be the contents of a symlink that used to be in the right place. It might have been unlinked while we'd been traversing it, but that's not a correctness issue. But that critically depends upon the contents not getting mangled. If it *can* be screwed by such unlink, we risk successful lookup leading to the wrong place, with nothing to tell us that it's happening. We could handle that by adding a check to fs/namei.c:put_link(), and propagating the error to callers. It's not impossible, but it won't be pretty. And that assumes we avoid oopsen on string changing under us in the first place. Which might or might not be true - I hadn't finished the audit yet. Note that it's *NOT* just fs/namei.c + fs/dcache.c + some fs methods - we need to make sure that e.g. everything called by ->d_hash() instances is OK with strings changing right under them. Including utf8_to_utf32(), crc32_le(), utf8_casefold_hash(), etc.