[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230601104525.27897-1-jack@suse.cz>
Date: Thu, 1 Jun 2023 12:58:20 +0200
From: Jan Kara <jack@...e.cz>
To: Al Viro <viro@...IV.linux.org.uk>
Cc: <linux-fsdevel@...r.kernel.org>,
Christian Brauner <brauner@...nel.org>,
Miklos Szeredi <miklos@...redi.hu>,
"Darrick J. Wong" <djwong@...nel.org>, Ted Tso <tytso@....edu>,
Jaegeuk Kim <jaegeuk@...nel.org>, <linux-ext4@...r.kernel.org>,
<linux-xfs@...r.kernel.org>,
linux-f2fs-devel@...ts.sourceforge.net, Jan Kara <jack@...e.cz>
Subject: [PATCH v2 0/6] fs: Fix directory corruption when moving directories
Hello,
this patch set fixes a problem with cross directory renames originally reported
in [1]. To quickly sum it up some filesystems (so far we know at least about
ext4, udf, f2fs, ocfs2, likely also reiserfs, gfs2 and others) need to lock the
directory when it is being renamed into another directory. This is because we
need to update the parent pointer in the directory in that case and if that
races with other operation on the directory (in particular a conversion from
one directory format into another), bad things can happen.
So far we've done the locking in the filesystem code but recently Darrick
pointed out [2] that we've missed the RENAME_EXCHANGE case in our ext4 fix.
That one is particularly nasty because RENAME_EXCHANGE can arbitrarily mix
regular files and directories and proper lock ordering is not achievable in the
filesystems alone.
This patch set adds locking into vfs_rename() so that not only parent
directories but also moved inodes (regardless whether they are directories or
not) are locked when calling into the filesystem.
Changes since v1:
* Made sure lock_two_inodes() uses subclass1 for the obtained lock in case
there is only one inode locked
* Fixes unlocked_two_nondirectories() to properly unlock inodes even if
directories are accidentally passed in.
Honza
[1] https://lore.kernel.org/all/20230117123735.un7wbamlbdihninm@quack3
[2] https://lore.kernel.org/all/20230517045836.GA11594@frogsfrogsfrogs
Previous versions:
Link: http://lore.kernel.org/r/20230525100654.15069-1-jack@suse.cz # v1
Powered by blists - more mailing lists