[Devel] [PATCH RHEL7 COMMIT] RCU pathwalk breakage when running into a symlink overmounting something
Vasily Averin
vvs at virtuozzo.com
Thu May 27 13:11:08 MSK 2021
The commit is pushed to "branch-rh7-3.10.0-1160.25.1.vz7.180.x-ovz" and will appear at https://src.openvz.org/scm/ovz/vzkernel.git
after rh7-3.10.0-1160.25.1.vz7.180.8
------>
commit e68cad95614d71ce3dae5027895e626383bbf225
Author: Al Viro <viro at zeniv.linux.org.uk>
Date: Thu May 27 13:11:06 2021 +0300
RCU pathwalk breakage when running into a symlink overmounting something
Calling unlazy_walk() in walk_component() and do_last() when we find
a symlink that needs to be followed doesn't acquire a reference to vfsmount.
That's fine when the symlink is on the same vfsmount as the parent directory
(which is almost always the case), but it's not always true - one _can_
manage to bind a symlink on top of something. And in such cases we end up
with excessive mntput().
Cc: stable at vger.kernel.org # since 2.6.39
Signed-off-by: Al Viro <viro at zeniv.linux.org.uk>
--
When symlink-symlink bindmount is created on ploop, which is posible
after we've ported open_tree()+move_mount() kernel interface, calling
lstat on it makes excess decrement of the bindmount's mnt_pcp refcount,
which leads to leaked mount and thus blocks ploop device and thus
blocks container. So after this symlink-symlink bindmount is added in
container one can't restart this container.
https://jira.sw.ru/browse/PSBM-129639
(cherry-pick from ms 3cab989afd8d8d1bc3d99fef0e7ed87c31e7b647)
Signed-off-by: Pavel Tikhomirov <ptikhomirov at virtuozzo.com>
---
fs/namei.c | 6 ++++--
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/fs/namei.c b/fs/namei.c
index a25c05a..85c0ffa 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -1601,7 +1601,8 @@ static inline int walk_component(struct nameidata *nd, struct path *path,
if (should_follow_link(path->dentry, follow)) {
if (nd->flags & LOOKUP_RCU) {
- if (unlikely(unlazy_walk(nd, path->dentry))) {
+ if (unlikely(nd->path.mnt != path->mnt ||
+ unlazy_walk(nd, path->dentry))) {
err = -ECHILD;
goto out_err;
}
@@ -3208,7 +3209,8 @@ finish_lookup:
if (should_follow_link(path->dentry, !symlink_ok)) {
if (nd->flags & LOOKUP_RCU) {
- if (unlikely(unlazy_walk(nd, path->dentry))) {
+ if (unlikely(nd->path.mnt != path->mnt ||
+ unlazy_walk(nd, path->dentry))) {
error = -ECHILD;
goto out;
}
More information about the Devel
mailing list