Received: by 2002:a05:6500:1b45:b0:1f5:f2ab:c469 with SMTP id cz5csp126694lqb; Tue, 16 Apr 2024 10:32:37 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVOHQJq55fwBZx+FDzZ/W5mRCjaPisgKZdhQVK5YEM7GcNwf67y58/oktZTX237ssrHJAtUzCUoB0LsfPx5IyhXHBdLBp76lOlIrJSLAA== X-Google-Smtp-Source: AGHT+IGzR+H8KUSAFmTnw1A+vefcU+YtgCQ0Cpp4o8/GCzrX2dRIqp59sUtFV/I8pbMdHnxoEAzy X-Received: by 2002:ac2:4205:0:b0:516:e8b1:177d with SMTP id y5-20020ac24205000000b00516e8b1177dmr9063472lfh.65.1713288757782; Tue, 16 Apr 2024 10:32:37 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713288757; cv=pass; d=google.com; s=arc-20160816; b=hUU/qscVoULkXGqw35NlXhSfiGXiRrbYTe0jQloJwvgJr0HNmzl32hjXCmKrcy2V6d Nc9o5OXhkNwlmemUrGKdWrQsWrXZIxRNzRKm3C537YtkLCyJ+lGR+G0Kp1PAPcqoP7RX y6HYpfQR0Zrlv+vd6JqMuhvLSgjAqwtZAdqY5iqSuWiZKo6q2YAi4ycIHJbnX3UtxhfI GcmarRd29/5OwJsUpb411yQgVnzWCAwO/eDFSrdgVPKHNI04io0+Te3bIXnuj2DxQlBb bdRCNdUAQZCwh0EyuUUub8xgjzA9kVOhDZy5Y9Z2zd3N72jJXqFC1M6ZmhmvAAW5n4JX yQog== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature:dkim-signature:dkim-signature; bh=xwA3YS9HQj9ZpIkXHCvSsfa7M193mD9+t9gZKLFbJhE=; fh=AK0XP8rIoiWxU6GzPMYjuA4+yp0jwwRuttQjE8TCfr4=; b=NLAYwrbUb/3Npt44MHAfCXPDRqqPVR24NovqVRa8V31ikGss9FAZTF/weNsbgzmzAc e6CS79H7ci2iSBVL5CVRZv4pVLF7+JsGsYp/+wApSQniGa6LCVZz5AU1WeUM8S02EH+N 889QxLER0yu9dqjVWddRUmR/+O4FRqpMaQOze7ZNF6rlyhIr4N1DZNguV2+olQhlXkH4 ZUVDtQBPrc2zsUJxFtsdfMlXJuFBuurCPpg1bFqjSCbPSakxThfo24gREe7b1KRXNlOU w4FEMZGRYCD62A6ENJ8fceMOrhdo309GSlrpAfWate0BvoQUpTjN5WlOSz/Bnfko/KaU phBA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=MJt366+d; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=MJt366+d; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519; arc=pass (i=1 spf=pass spfdomain=suse.cz dkim=pass dkdomain=suse.cz dkim=pass dkdomain=suse.cz); spf=pass (google.com: domain of linux-kernel+bounces-147315-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-147315-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id i26-20020a17090671da00b00a5243968262si4239743ejk.472.2024.04.16.10.32.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Apr 2024 10:32:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-147315-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=MJt366+d; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=MJt366+d; dkim=neutral (no key) header.i=@suse.cz header.s=susede2_ed25519; arc=pass (i=1 spf=pass spfdomain=suse.cz dkim=pass dkdomain=suse.cz dkim=pass dkdomain=suse.cz); spf=pass (google.com: domain of linux-kernel+bounces-147315-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-147315-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 4D02E1F234F8 for ; Tue, 16 Apr 2024 17:32:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BE633132C1F; Tue, 16 Apr 2024 17:32:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=suse.cz header.i=@suse.cz header.b="MJt366+d"; dkim=permerror (0-bit key) header.d=suse.cz header.i=@suse.cz header.b="+s3eREcd"; dkim=pass (1024-bit key) header.d=suse.cz header.i=@suse.cz header.b="MJt366+d"; dkim=permerror (0-bit key) header.d=suse.cz header.i=@suse.cz header.b="+s3eREcd" Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.223.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 43C36F9F0; Tue, 16 Apr 2024 17:32:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=195.135.223.131 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713288744; cv=none; b=jnl2ArBvuD8vTpOJIvEvSRt7hQuMH2pEUga/hbuNAWcdNyjb4XQMtX0mi1CQ7xgaiHLwX/oR3FI8AND88CCnvRjDY0Z2e1OpbW3iJ8tBpUtvzAG0ESbsaJxQ738b0poOBR2iKrDXf7CGCMbm7Mv9b1oj8xHTeG/d5UIuXCoSPJw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713288744; c=relaxed/simple; bh=PJ+KxCHtv1tcJeCl9VufEf1776JTETB6rOG5cbd/X+Y=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=QmShdIDt0L1Va5Y4s4mMC7bBOY+KPBu+ifKobI/JHkiF+XRb/j3vbkrzxSIQYF6PENMMgkGSnRhZiNiL5Zp18LbwiLS8EVqU+ziiaQeWC+uTOg8SnRXWOYIR2OGBcOU4kgYq20OrBbhuUwZLXo8EhBE+fkZGshGgTV14KD/wjtY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=suse.cz; spf=pass smtp.mailfrom=suse.cz; dkim=pass (1024-bit key) header.d=suse.cz header.i=@suse.cz header.b=MJt366+d; dkim=permerror (0-bit key) header.d=suse.cz header.i=@suse.cz header.b=+s3eREcd; dkim=pass (1024-bit key) header.d=suse.cz header.i=@suse.cz header.b=MJt366+d; dkim=permerror (0-bit key) header.d=suse.cz header.i=@suse.cz header.b=+s3eREcd; arc=none smtp.client-ip=195.135.223.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=suse.cz Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.cz Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 2E2091F385; Tue, 16 Apr 2024 17:32:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1713288740; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xwA3YS9HQj9ZpIkXHCvSsfa7M193mD9+t9gZKLFbJhE=; b=MJt366+dN+/zkxmKZNSgzDOZU+3dszxfqcOvvr0cEAckMjWVo29vnRplJpjthzCxoTAI0z LE2XcnhHB9bIY45YQ/+kgJyXA993GIce2OYM+21jTyBuf0SgyLV2IUaFOoKQ6Cc+gXRM+Q 6b3nbsepPGH7yh+cQxN6KuVkPwhkc+Y= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1713288740; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xwA3YS9HQj9ZpIkXHCvSsfa7M193mD9+t9gZKLFbJhE=; b=+s3eREcdJ22wZ+2Q/+64Q9aaJwYtXUyzEhL5SJR73iMvvutCtynK9dT4Be67ehMmOIClJu uOdobigvgRuPllBg== Authentication-Results: smtp-out2.suse.de; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=MJt366+d; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=+s3eREcd DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1713288740; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xwA3YS9HQj9ZpIkXHCvSsfa7M193mD9+t9gZKLFbJhE=; b=MJt366+dN+/zkxmKZNSgzDOZU+3dszxfqcOvvr0cEAckMjWVo29vnRplJpjthzCxoTAI0z LE2XcnhHB9bIY45YQ/+kgJyXA993GIce2OYM+21jTyBuf0SgyLV2IUaFOoKQ6Cc+gXRM+Q 6b3nbsepPGH7yh+cQxN6KuVkPwhkc+Y= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1713288740; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=xwA3YS9HQj9ZpIkXHCvSsfa7M193mD9+t9gZKLFbJhE=; b=+s3eREcdJ22wZ+2Q/+64Q9aaJwYtXUyzEhL5SJR73iMvvutCtynK9dT4Be67ehMmOIClJu uOdobigvgRuPllBg== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 18E8013432; Tue, 16 Apr 2024 17:32:20 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id fenKBSS2HmbCMQAAD6G6ig (envelope-from ); Tue, 16 Apr 2024 17:32:20 +0000 Received: by quack3.suse.cz (Postfix, from userid 1000) id 6CDB9A0806; Tue, 16 Apr 2024 19:32:11 +0200 (CEST) Date: Tue, 16 Apr 2024 19:32:11 +0200 From: Jan Kara To: Amir Goldstein Cc: Jan Kara , Hillf Danton , syzbot , linux-fsdevel@vger.kernel.org, syzkaller-bugs@googlegroups.com, linux-kernel@vger.kernel.org Subject: Re: [syzbot] Re: [syzbot] [ext4?] KASAN: slab-use-after-free Read in fsnotify Message-ID: <20240416173211.4lnmgctyo4jn5fha@quack3> References: <00000000000095bb400615f4b0ed@google.com> <20240413084519.1774-1-hdanton@sina.com> <20240415140333.y44rk5ggbadv4oej@quack3> <20240416132207.idn7rjzq4d4rayaz@quack3> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Flag: NO X-Spam-Score: -2.51 X-Rspamd-Action: no action X-Rspamd-Queue-Id: 2E2091F385 X-Spam-Level: X-Rspamd-Server: rspamd2.dmz-prg2.suse.org X-Spamd-Result: default: False [-2.51 / 50.00]; BAYES_HAM(-3.00)[100.00%]; SUSPICIOUS_RECIPS(1.50)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MID_RHS_NOT_FQDN(0.50)[]; NEURAL_HAM_SHORT(-0.20)[-1.000]; R_DKIM_ALLOW(-0.20)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519]; MIME_GOOD(-0.10)[text/plain]; MX_GOOD(-0.01)[]; RCVD_COUNT_THREE(0.00)[3]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_TO(0.00)[gmail.com]; ARC_NA(0.00)[]; DKIM_SIGNED(0.00)[suse.cz:s=susede2_rsa,suse.cz:s=susede2_ed25519]; FUZZY_BLOCKED(0.00)[rspamd.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FREEMAIL_ENVRCPT(0.00)[gmail.com,sina.com]; FREEMAIL_CC(0.00)[suse.cz,sina.com,syzkaller.appspotmail.com,vger.kernel.org,googlegroups.com]; DBL_BLOCKED_OPENRESOLVER(0.00)[syzkaller.appspot.com:url,suse.com:email]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; RCPT_COUNT_SEVEN(0.00)[7]; RCVD_VIA_SMTP_AUTH(0.00)[]; TAGGED_RCPT(0.00)[5e3f9b2a67b45f16d4e6]; DKIM_TRACE(0.00)[suse.cz:+]; MISSING_XM_UA(0.00)[]; SUBJECT_HAS_QUESTION(0.00)[] On Tue 16-04-24 19:27:05, Amir Goldstein wrote: > On Tue, Apr 16, 2024 at 4:22 PM Jan Kara wrote: > > > > On Mon 15-04-24 17:47:45, Amir Goldstein wrote: > > > On Mon, Apr 15, 2024 at 5:03 PM Jan Kara wrote: > > > > > > > > On Sat 13-04-24 12:32:32, Amir Goldstein wrote: > > > > > On Sat, Apr 13, 2024 at 11:45 AM Hillf Danton wrote: > > > > > > On Fri, 12 Apr 2024 23:42:19 -0700 Amir Goldstein > > > > > > > On Sat, Apr 13, 2024 at 4:41=E2=80=AFAM Hillf Danton wrote: > > > > > > > > On Thu, 11 Apr 2024 01:11:20 -0700 > > > > > > > > > syzbot found the following issue on: > > > > > > > > > > > > > > > > > > HEAD commit: 6ebf211bb11d Add linux-next specific files for 20240410 > > > > > > > > > git tree: linux-next > > > > > > > > > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=3D1621af9d180000 > > > > > > > > > > > > > > > > #syz test https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 6ebf211bb11d > > > > > > > > > > > > > > > > --- x/fs/notify/fsnotify.c > > > > > > > > +++ y/fs/notify/fsnotify.c > > > > > > > > @@ -101,8 +101,8 @@ void fsnotify_sb_delete(struct super_blo > > > > > > > > wait_var_event(fsnotify_sb_watched_objects(sb), > > > > > > > > !atomic_long_read(fsnotify_sb_watched_objects(sb))); > > > > > > > > WARN_ON(fsnotify_sb_has_priority_watchers(sb, FSNOTIFY_PRIO_CONTENT)); > > > > > > > > - WARN_ON(fsnotify_sb_has_priority_watchers(sb, > > > > > > > > - FSNOTIFY_PRIO_PRE_CONTENT)); > > > > > > > > + WARN_ON(fsnotify_sb_has_priority_watchers(sb, FSNOTIFY_PRIO_PRE_CONTENT)); > > > > > > > > + synchronize_srcu(&fsnotify_mark_srcu); > > > > > > > > kfree(sbinfo); > > > > > > > > } > > > > > > > > > > > > > > > > @@ -499,7 +499,7 @@ int fsnotify(__u32 mask, const void *dat > > > > > > > > { > > > > > > > > const struct path *path =3D fsnotify_data_path(data, data_type); > > > > > > > > struct super_block *sb =3D fsnotify_data_sb(data, data_type); > > > > > > > > - struct fsnotify_sb_info *sbinfo =3D fsnotify_sb_info(sb); > > > > > > > > + struct fsnotify_sb_info *sbinfo; > > > > > > > > struct fsnotify_iter_info iter_info = {}; > > > > > > > > struct mount *mnt =3D NULL; > > > > > > > > struct inode *inode2 =3D NULL; > > > > > > > > @@ -529,6 +529,8 @@ int fsnotify(__u32 mask, const void *dat > > > > > > > > inode2_type =3D FSNOTIFY_ITER_TYPE_PARENT; > > > > > > > > } > > > > > > > > > > > > > > > > + iter_info.srcu_idx =3D srcu_read_lock(&fsnotify_mark_srcu); > > > > > > > > + sbinfo =3D fsnotify_sb_info(sb); > > > > > > > > /* > > > > > > > > * Optimization: srcu_read_lock() has a memory barrier which can > > > > > > > > * be expensive. It protects walking the *_fsnotify_marks lists. > > > > > > > > > > > > > > > > > > > > > See comment above. This kills the optimization. > > > > > > > It is not worth letting all the fsnotify hooks suffer the consequence > > > > > > > for the edge case of calling fsnotify hook during fs shutdown. > > > > > > > > > > > > Say nothing before reading your fix. > > > > > > > > > > > > > > Also, fsnotify_sb_info(sb) in fsnotify_sb_has_priority_watchers() > > > > > > > is also not protected and using srcu_read_lock() there completely > > > > > > > nullifies the purpose of fsnotify_sb_info. > > > > > > > > > > > > > > Here is a simplified fix for fsnotify_sb_error() rebased on the > > > > > > > pending mm fixes for this syzbot boot failure: > > > > > > > > > > > > > > #syz test: https://github.com/amir73il/linux fsnotify-fixes > > > > > > > > > > > > Feel free to post your patch at lore because not everyone has > > > > > > access to sites like github. > > > > > > > > > > > > > > Jan, > > > > > > > > > > > > > > I think that all the functions called from fs shutdown context > > > > > > > should observe that SB_ACTIVE is cleared but wasn't sure? > > > > > > > > > > > > If you composed fix based on SB_ACTIVE that is cleared in > > > > > > generic_shutdown_super() with &sb->s_umount held for write, > > > > > > I wonder what simpler serialization than srcu you could > > > > > > find/create in fsnotify. > > > > > > > > > > As far as I can tell there is no need for serialisation. > > > > > > > > > > The problem is that fsnotify_sb_error() can be called from the > > > > > context of ->put_super() call from generic_shutdown_super(). > > > > > > > > > > It's true that in the repro the thread calling fsnotify_sb_error() > > > > > in the worker thread running quota deferred work from put_super() > > > > > but I think there are sufficient barriers for this worker thread to > > > > > observer the cleared SB_ACTIVE flag. > > > > > > > > > > Anyway, according to syzbot, repro does not trigger the UAF > > > > > with my last fix. > > > > > > > > > > To be clear, any fsnotify_sb_error() that is a result of a user operation > > > > > would be holding an active reference to sb so cannot race with > > > > > fsnotify_sb_delete(), but I am not sure that same is true for ext4 > > > > > worker threads. > > > > > > > > > > Jan, > > > > > > > > > > You wrote that "In theory these two calls can even run in parallel > > > > > and fsnotify() can be holding fsnotify_sb_info pointer while > > > > > fsnotify_sb_delete() is freeing". > > > > > > > > > > Can you give an example of this case? > > > > > > > > Yeah, basically what Hilf writes: > > > > > > > > Task 1 Task 2 > > > > umount() some delayed work, transaction > > > > commit, whatever is still running > > > > before ext4_put_super() completes > > > > ... ext4_error() > > > > fsnotify_sb_error() > > > > fsnotify() > > > > fetches fsnotify_sb_info > > > > generic_shutdown_super() > > > > fsnotify_sb_delete() > > > > frees fsnotify_sb_info > > > > > > OK, so what do you say about Hillf's fix patch? > > > > > > Maybe it is ok to let go of the optimization in fsnotify(), considering > > > that we now have stronger optimizations in the inline hooks and > > > in __fsnotify_parent()? > > > > > > I think that Hillf's patch is missing setting s_fsnotify_info to NULL? > > > > > > @@ -101,8 +101,8 @@ void fsnotify_sb_delete(struct super_blo > > > wait_var_event(fsnotify_sb_watched_objects(sb), > > > !atomic_long_read(fsnotify_sb_watched_objects(sb))); > > > WARN_ON(fsnotify_sb_has_priority_watchers(sb, FSNOTIFY_PRIO_CONTENT)); > > > + WRITE_ONCE(sb->s_fsnotify_info, NULL); > > > + synchronize_srcu(&fsnotify_mark_srcu); > > > kfree(sbinfo); > > > } > > > > So I had a look into this. Yes, something like this should work. We'll see > > whether synchronize_srcu() won't slow down umount too much. If someone will > > complain, we'll have to find a better solution. > > > > Actually, kfree_rcu(sbinfo) may be enough. > We do not actually access sbinfo during mark iteration and > event handling, we only access it to get to the sb connector. > > Something like the attached patch? Hum, thinking about this some more - what if we just freed sb_info from destroy_super_work()? By then we definitely are not getting fsnotify() calls for the superblock so all the problems are solved. Honza -- Jan Kara SUSE Labs, CR