Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp861300iog; Mon, 13 Jun 2022 14:44:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyIOkzsWtZ4QNHgK9cRhRlJnBY11Z8yA6WbJP+8DUrfjhbHPn5wBtHPi+f3AisoV0P3r4tF X-Received: by 2002:a05:6a00:170c:b0:51b:f057:85c2 with SMTP id h12-20020a056a00170c00b0051bf05785c2mr1021355pfc.18.1655156663636; Mon, 13 Jun 2022 14:44:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655156663; cv=none; d=google.com; s=arc-20160816; b=bHO42Wnn1/dJf5KV409fvXPpyUqucN7mpzBMkTXf/+/XKapnwSM+Q3APqQXmBfLkhZ LwAMh0fIOxKgti4xTb/b+5N3FUPBYEAHf8THMjr8+HTUXlCRPs9joLEBiLgA+01GBETL Ll5lMfxDlrZQyh6zKYnJHVToZhRazMCC06WyOM/+b+68rzFHJEpPJEBAdEz83g8chVjD yTfR9D0+cf2BsKpASxuV5MLc254OzK4p81tk7oUHH2rRNa5/fDealNanPY3jVbBK7d/B ZN8/Qw2ps+Ag4oXexvRMi2ZiGq/Txht3n0f0NOlzK03jFeXtE7tELKBaBPu25muN++Ij xxgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-filter; bh=Nlhe89f21s2Nn6sZlzNNWxjIOhCd8EeCNee7Yy+xEvU=; b=NKneVRSMyrVEMFUipXPCk/lc+voeRwYy/NhsTnOa8QrSiOPKgadxZ6b1J/wXk7kDlV Bxhy+zR0wEVTS/fo0eFMmJdZKbvewvF/XfnTFT1BbGUlrDpLaZzYy7rSPEbjPabI0gzX owZGsuoGnUhg7AmXG0FxAbLyr39pU89RmNB/AEEm7aGsahiaE26YrbMo2BpF1hbagVok ENFfQeG6EubPOtzGEJtn1sO/pFY5ND0/NXrlgWm3MeR4SKbU9809P1QtghHTgdHuOZu4 pBc+MyS3NpATRDHfC+kTHJPJHaXjzjWQkz9jz9OG56u8pvHUQ8g9inwPhUlmUtB068Da l+lA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ikjQZmtH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q2-20020a170902eb8200b001639f4baac2si11311100plg.332.2022.06.13.14.44.11; Mon, 13 Jun 2022 14:44:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=ikjQZmtH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230385AbiFMUlW (ORCPT + 99 others); Mon, 13 Jun 2022 16:41:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43668 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242261AbiFMUk7 (ORCPT ); Mon, 13 Jun 2022 16:40:59 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9FBB45B887 for ; Mon, 13 Jun 2022 12:38:11 -0700 (PDT) Received: from sequoia (162-237-133-238.lightspeed.rcsntx.sbcglobal.net [162.237.133.238]) by linux.microsoft.com (Postfix) with ESMTPSA id BDFC520C154C; Mon, 13 Jun 2022 12:38:10 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com BDFC520C154C DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1655149091; bh=Nlhe89f21s2Nn6sZlzNNWxjIOhCd8EeCNee7Yy+xEvU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ikjQZmtHOZ+WLe7eXSv06sgC+WIMy6qYOHsYl7R3s+ezYufbTNoh1MQu0ZSQzrnng xYlX8CztPE8odeMby13fHDEYRtASMSs4m0XSf4+JW3cYWTVZbxjIdlxMwQbapVww7H VaYAyOL+V7jxcNjtFFJJebiJadQAYuPPUzUWKM6k= Date: Mon, 13 Jun 2022 14:38:07 -0500 From: Tyler Hicks To: Dominique Martinet Cc: Eric Van Hensbergen , Latchesar Ionkov , Christian Schoenebeck , Jianyong Wu , v9fs-developer@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 1/5] 9p: Fix refcounting during full path walks for fid lookups Message-ID: <20220613193807.GF7401@sequoia> References: <20220527000003.355812-1-tyhicks@linux.microsoft.com> <20220527000003.355812-2-tyhicks@linux.microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-19.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-06-12 08:17:16, Dominique Martinet wrote: > Tyler Hicks wrote on Thu, May 26, 2022 at 06:59:59PM -0500: > > Decrement the refcount of the parent dentry's fid after walking > > each path component during a full path walk for a lookup. Failure to do > > so can lead to fids that are not clunked until the filesystem is > > unmounted, as indicated by this warning: > > > > 9pnet: found fid 3 not clunked > > > > The improper refcounting after walking resulted in open(2) returning > > -EIO on any directories underneath the mount point when using the virtio > > transport. When using the fd transport, there's no apparent issue until > > the filesytem is unmounted and the warning above is emitted to the logs. > > > > In some cases, the user may not yet be attached to the filesystem and a > > new root fid, associated with the user, is created and attached to the > > root dentry before the full path walk is performed. Increment the new > > root fid's refcount to two in that situation so that it can be safely > > decremented to one after it is used for the walk operation. The new fid > > will still be attached to the root dentry when > > v9fs_fid_lookup_with_uid() returns so a final refcount of one is > > correct/expected. > > > > Fixes: 6636b6dcc3db ("9p: add refcount to p9_fid struct") > > Cc: stable@vger.kernel.org > > Signed-off-by: Tyler Hicks > > --- > > fs/9p/fid.c | 17 +++++------------ > > 1 file changed, 5 insertions(+), 12 deletions(-) > > > > diff --git a/fs/9p/fid.c b/fs/9p/fid.c > > index 79df61fe0e59..5a469b79c1ee 100644 > > --- a/fs/9p/fid.c > > +++ b/fs/9p/fid.c > > @@ -152,7 +152,7 @@ static struct p9_fid *v9fs_fid_lookup_with_uid(struct dentry *dentry, > > const unsigned char **wnames, *uname; > > int i, n, l, clone, access; > > struct v9fs_session_info *v9ses; > > - struct p9_fid *fid, *old_fid = NULL; > > + struct p9_fid *fid, *old_fid; > > > > v9ses = v9fs_dentry2v9ses(dentry); > > access = v9ses->flags & V9FS_ACCESS_MASK; > > @@ -194,13 +194,12 @@ static struct p9_fid *v9fs_fid_lookup_with_uid(struct dentry *dentry, > > if (IS_ERR(fid)) > > return fid; > > > > + refcount_inc(&fid->count); > > v9fs_fid_add(dentry->d_sb->s_root, fid); > > } > > /* If we are root ourself just return that */ > > - if (dentry->d_sb->s_root == dentry) { > > - refcount_inc(&fid->count); > > + if (dentry->d_sb->s_root == dentry) > > return fid; > > - } > > /* > > * Do a multipath walk with attached root. > > * When walking parent we need to make sure we > > @@ -212,6 +211,7 @@ static struct p9_fid *v9fs_fid_lookup_with_uid(struct dentry *dentry, > > fid = ERR_PTR(n); > > goto err_out; > > } > > + old_fid = fid; > > clone = 1; > > i = 0; > > while (i < n) { > > @@ -221,15 +221,8 @@ static struct p9_fid *v9fs_fid_lookup_with_uid(struct dentry *dentry, > > * walk to ensure none of the patch component change > > */ > > fid = p9_client_walk(fid, l, &wnames[i], clone); > > + p9_client_clunk(old_fid); > > hmm, if we're not cloning then fid == old_fid and the refcount is not > increased? (I think... I didn't even realize/remember that walk had a > no-clone mode, sorry.) > > So we'd only need to clunk if old fid here if we're cloning (old fid is > the initial root fid), but I'm not sure how to test this path as I > couldn't think of any pattern that'd trigger a multi-level lookup, > so I'm not 100% sure; I'll try a bit more. Yes, you're correct. Nice catch! Tyler > > -- > Dominique >